Don't Be a Target: Your Virtual Assistant
Mobile Security (Without TOC)
This module identifies security risks resulting from business-based mobile device use in public places and on public networks. It provides suggested mobile device best practices like screen locks, device encryption and Wi-Fi validation.
Don't Be a Target: Your Mobile Device
Many of these devices use their own wireless networks and are used in public. These facts make your mobile phones and devices susceptible to hackers.
Poster - Need to Know: Mobile Security
Infosec Named a Leader in 2019 Gartner Magic Quadrant
Recognized for ability to execute and completeness of vision in Security Awareness Computer-Based Training, learn the latest market trends and what we believe sets Infosec apart.