In a sense, controlling access to your PCs and critical data is like locking your front door to deter an intruder. How strong is the lock? Is your key kept secure or simply hidden under the welcome mat?