Slide 1
This security awareness training will teach you how to use mobile devices, such as cellular phones and tablets, safely.
Mobile devices are different from traditional workplace computers in several ways. They are often devices that you select and manage, use their own network, and are used in public.
Slide 2
Today we will start by learning how to protect devices from thieves using locking screens and encryption. Next, we will learn how to protect devices using antivirus and updates. And finally, we will learn how to use wireless options safely.
To protect phones and other devices from thieves, we can follow some of the same practices we use to secure laptops and USB devices. First, use automatically locking screens to prevent thieves from easily accessing the data on stolen devices.
Look at the phones on your screen and determine which of the phones shown is more secure.
That’s right!
The phone that has been passcode protected is the most difficult for a hacker to infiltrate.
Sorry, but that’s incorrect.
The phone that has been passcode protected is the most difficult for a hacker to infiltrate.
Slide 3
Second, use encryption on your phone and tablets to keep data safe from determined thieves. Even if your phone is disassembled, encryption will prevent thieves from extracting any confidential information you stored or viewed on your device.
To protect phones and other devices from hackers, we can follow some of the same practices we use to secure computers. First, use antivirus technology on devices that support it, such as Windows tablets, Android phones and many Apple devices. This will prevent malware from installing itself on your devices.
Sorry, but that’s incorrect.
The phone that has been passcode protected is the most difficult for a hacker to infiltrate.
Slide 4
Third, make sure software and firmware updates are regularly applied to your devices. Remember that software updates include both your device’s operating systems, such as Android, and the individual apps you install on your device. Regular updates will ensure that hackers cannot take advantage of old vulnerabilities.
Which of these steps should you take to help keep your mobile devices secure? Select all that apply, then click Submit.
That’s right!
To keep your mobile devices secure, you should use antivirus technology on devices that support it and keep software up-to-date.
Click anywhere to continue.
Sorry, but that’s incorrect.
To keep your mobile devices secure,
you should use antivirus technology on devices that support it and keep software up-to-date.
Click anywhere to try again. Click Reset to remove your previous answers.
Sorry, but that’s incorrect.
The phone that has been passcode protected is the most difficult for a hacker to infiltrate.
Slide 5
After you have secured your device against thieves and hackers, you should also take care to lock down its wireless options. Specifically, you should concentrate on three things. First, you should control whether your device automatically connects to wireless networks or not, because hackers can see this information and can pretend to be one of your remembered networks.
Second, you should also be aware of whether your device is a Wifi hotspot or not because Hackers often attack phones and tablets acting as hotspots in public places. Make sure you are aware of related hotspot settings, such as a strong Wifi password, and whether or not any password is required to access your device.
Finally, you should be careful about granting networking permissions, including phone and text permissions, to apps that request them. Rogue applications have been known to exploit devices to ring up phone charges or act as communication channels for other malware. When in doubt, select an app that does the same thing but requests fewer permissions.
Slide 6
In the last few minutes, we discussed securing mobile devices from thieves and hackers using locks, encryption, antivirus, and updates. We also discussed how to safely configure the wireless capabilities of your mobile devices, including limiting remembered connections, watching your hotspot settings, and rejecting apps that ask for too many privileges. Please review or print these takeaways and then click “continue” to complete the module.