In my last post, IT Security: Is Your Information Leaking?, I talked about how we are moving away from a traditional model of controlling information, where access to the office is one of the key factors, to a more mobile model where access to the Internet is the only technical requirement to quickly access resources. However, this introduces challenges controlling the distribution of your privileged information.