Mobile Device Protection Training

With more and more business being conducted on-the-go, it is essential for employees to learn best practices for mobile device protection. Most organizations allow employees to work on laptops, which can be taken anywhere and are easy targets for thieves and hackers if not properly secured. Employees increasingly access their business email and applications on their personal smartphones, making these little devices a big liability if they contain a lot of sensitive emails and other data. Many field and medical employees routinely use tablets to access customer and patient data which could also be compromised if the tablet is stolen or hacked. Even more worrisome, executives may be carrying financial data or valuable intellectual property on their mobile devices which could cause catastrophic loss if exposed.

According to IDG,  82 percent of survey respondents reported that the majority of their corporate data is accessible to users via mobile devices, and 74 percent  reported that their organizations had experienced a data breach as a result of a mobile security issue. This should make mobile device protection an extremely important issue for Information Security personnel worldwide.

The threats largely come from mobile apps that contain malware, that can access or transmit sensitive data, that utilize spy ware to stalk individuals and that contain other security vulnerabilities. Many users also don’t think about changing the default configurations of installed apps, and may be giving apps unnecessary access to their contacts, calendar and location.

This course helps employees take a step in the right direction with regard to mobile device protection. It covers the system settings to apply in mobile devices – settings related to passwords, network connections, remote usage, and factory reset. It also teaches best practices  for web downloads, software updates, instant messaging, emails, and sensitive information.

Duration: 9 minutes

mobile device protection
  • Building Block

  • Security Awareness

  • Best Practice Module