Mobile Devices Risk Management 2 Days

Malware and viruses represent a significant risk for smartphones; a risk of which many consumers remain unaware. Unfortunately, this threat to smartphone security is not limited to illicit programs, such as malware or viruses. Legitimate programs produced by respected companies are also used to collect and disseminate our personal information.

In addition to the well-known companies such as Facebook, smartphone-specific companies, also track and monitor our usage. Occasionally, these companies even sell this information, thus further removing users’ ability to control privacy.

All of this means that containing security risks to our smartphone is not as simple as downloading and installing an antivirus program.

Appropriate training is required for employees and users to understand the security and private risks and assess level of exposure to devices. This course also helps learners to know key steps that consumers can take to protect their devices.

This course will teach you how to protect yourself against threats to your smartphone, as well as how to respond in the event that you become a victim of an attack. We all interact with our world using a variety of mobile devices. To verify our identification, we are forced to enter personal information. This information is now held by numerous sites, banks, social media, mobile storefronts, cell phone carriers, and many more

Course Content

Living in a Mobile World

Users and Mobile Device Management to Protect Organisations

Privacy – Small Word, Big Consequences

Protecting Your Mobile Devices

Mobile Risk Management

Understanding Risks from Colliding Generations

Getting Your Life Back After You've Been Hacked

Social Media Control and Governance

Formulating a Written Social Media Policyics

Social Media Security

and more...

1. Chief Information Security Officers (Cisos) And Heads Of Information Security.
2. Information Security Managers And Engineers.
3. Senior Internal Auditors And IT Auditors.
4. Risk Management Professionals.
5. Heads Of IT And IT Support Managers.
6. Data Privacy Managers And Specialists.
7. Heads Of Compliance, Compliance Managers.
8. Heads Of Legal, General Counsel And In-House Legal Specialists.
9. Marketing And Communications Specialists Involved With Social Media.
10. Human Resources Directors And Managers.
1. Today, nearly every individual uses some kind of intelligent mobile device and for the end user, it is important to understand the risks inherent in using these devices. The benefit is obvious, but keeping users safe in this mobile world is more essential than ever.
2. This course is designed to help learns who wish to know how to protect themselves in this new mobile world. The course explains how to protect your device, as well as the actions you should take in the event that your personal information or device is compromised.
3. Most consumers are aware of the risks that viruses and malware pose for computers, but many are not aware that smartphones are vulnerable to the same sort of harmful attacks and the lack of awareness on the part of consumers and users becomes truly alarming.