Information Security & Mobile Devices Awareness
Understand the dangers of using mobile devices, and learn practical ways to minimize the risk
Our Client
What is Information Security and Mobile Device
Security risks haunt the use of mobile devices at work. As such devices can transport sensitive information in and out of the office network, criminals regularly use them as entry points into your organization. Mostly, it’s done by installing mobile malware over employees phones, or by breaching the thin security layer guarding your mobile phones and tablets.
To protect the sensitive data over your office network, you need to treat your mobile devices just like any computer connected with your office network. Use antivirus software’s, firewalls, and practice email hygiene. Unfortunately, unlike office computers, mobile devices can move out of the secure office network, and in some cases, workers share them with family members as well.
Mobile Devices Such as laptops, tablets, and mobile phones are an integral part of how we communicate and do business.
Due to portability, ease and widespread use of such devices they create additional information security risks. You need to consider these risks when using mobile devices to access or share sensitive information.
First, you’ll learn about the information security principles that govern the use of mobile devices outside your workplace.
Then, we’ll introduce you to the risks of data breach when using mobile devices, and the basic measures that can reduce your exposure to such risks.
And lastly, we’ll talk about the possibility that your mobile device is stolen, lost or damaged.
Course Description
Category | Information Security |
Course Name | Information Security and Mobile Devices |
Duration | 30 mins |
Certificate Included | Yes |
Languages | English |
Course Type | Interactive online training |
Narration | Yes |
Format | LM-light, SCORM 1.2 |
Supported Devices | Desktop/Laptop, Tablet, Phone |
Last Updated | June 30, 2021 |
What you’ll learn
- What is a mobile device, and why they pose a security problem
- How mobile devices are typically used, and the security precautions you need to take when using them
- Risks of loss or damage of a device, and what steps you should take to minimize those risks
Curriculum
- Information security and mobile devices
- Structure of this course
- Introduction to mobile security
- What devices are we worried about?
- Basic information security measures
- How serious is the problem?
- Potential impact of using mobile devices
- Security issues during normal use
- The risk of mobile viruses
- Using your laptop outside the office
- Use firewalls to protect your data
- The risk of using wireless networks
- What is shoulder surfing?
- Mobile phone conversations
- Use password protection
- The risk of loss or damage
- The risk of theft of mobile phones
- Securing mobile devices
- Why to use encryption
- The risk of dropping your phones
- Carrying bags for laptops
- Don’t forget your USB drives
- The effect of environmental conditions
- Why do you need to take backups?
- What you should have learned
Who Should Attend?
- IT security staff who need to expand their understanding of mobile threats
- System and network administrators who need to allow mobile devices into their environment
- Staff members that use laptops, mobile phones, tablets, and other mobile devices
Why emPower
100s of customers
- 14+ Years of experience in working with small to large businesses from different industries
- 95% customer retention
Customer Experience
- 24x7 dedicated support and toll free number
- 99%+ guaranteed uptime
Extremely Cost-effective
- As low as $0.99/user/yr
- We will match or better the price of your current LMS
Effective Courses
- Each course is 20-40 min long to ensure engagement with quizzes and certificate
- SCORM 1.2 Compliant
Implementation
- No setup costs
- We deploy your customized solution in less than 48 hours
Our Achievements
Here you can review some statistics about our Education Center
Related Courses
Start Your Certification Course Today
Computer security is important for everyone who uses a computer or laptop at work. Similarly, if you use mobile phones, tablets, or other internet connected devices, you need to practice computer security. Such measures are important to protect your devices and the data stored over them.
The need for cyber security training varies with job roles. For most roles, cyber security awareness training would do. But, if you are a system administrator, or if you are in a cyber security role, you’d need specialized training. The training requirements vary with industry as well.
For those businesses and workers who depend largely on computers, securing your computers is a must. Firstly, criminals use web-based and physical tools to break into office computers. You cannot guard against such attacks without securing your computers. Secondly, federal and state laws require you to safeguard customer information stored on your computers.
Learning about information and computer security is a must for those who have been provided with a computer or a mobile phone to carry out their duties. Firstly, you need to learn how to protect your device and the data stored over it. Secondly, if you connect with your office network, or use online tools, you need to know the best practices to safeguard your connection.