Time
44 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:03
Hello. Welcome to cyber and data security and user awareness. This is episode to heart one. Mobile device Security Thank you so much for joining me today for this informative session.
00:20
Why take this course? Because hacking your device to obtain personally identifiable information can be It's easy. It's stealing your phone. There is no need to conduct an elaborate fishing expedition or other social engineering. Plot.
00:44
A pre assessment question to make sure you were in the right course. It's why is mobile phone security important?
00:52
Mobile phones have surpassed fixed phone lines.
00:55
Mobile phones are the number one communication preference.
00:59
Mobile phones are regularly sync with data stored on desktop computers.
01:04
All of the above.
01:10
How were learning objectives for episode to heart one. Mr Discover Trends related to mobile phone use.
01:18
Clean up mobile stone storage and learn how to my great phone data to the cloud.
01:30
Why is mobile phone security important? They are the wave of the future. Take a look at this chart. Almost 15 years ago, approximately 100% of U. S households were equipped with the landline. By 2016 the figure dropped
01:48
almost in half.
01:51
What replaced Landlines.
01:53
Smart cell phones from the same time period,
01:57
the percentage of Americans with smartphones doubled.
02:01
What are the prerequisites for this course? Completion of episodes, one
02:07
part one and one part to a sincere desire to learn and basic computer skills.
02:24
The supplementary materials needed for this episode ISP access to an android device,
02:32
the manufacturer's instruction manual,
02:37
the cell phone service provider
02:39
address and Internet access.
02:50
Before we apply mobile security tactics, let's learn why would wouldn't need to do so,
02:57
according to Google, are more mobile device is our number one preference for communication with switch back and forth between devices such as desktop mobile and tablet? Why is this so Because we get a lot of our information from the Internet, it is one of the most used resource is. Finally,
03:16
where do we use these devices at home
03:20
work and when we shop,
03:25
an up and coming trend is the realization that computer devices are appendages twice our daily lives. According to statistics, we send about 200 million e mails and 40 million mobile messages per Internet minute.
03:52
Now that we know that mobile devices are our preferred communication device and that we use it at work home and when we shop and that we use it to send more than 200 million e mails and 40 million mobile messages per Internet minute.
04:09
Let's talk about a few mobile and social media security measures.
04:14
A few best practices are to refrain from using the same username and password across several social media platforms.
04:21
To refrain from using one single Facebook of Google log and credential over multiple platforms and to refrain from posting your personal information on the Internet. Such is your birthdate middle name and made a name
04:51
in addition to these best practices. Less complete. The following task. Clear storage. To do so, take your mobile phone. Click the settings option.
05:02
You see the magnify setting button on the screen there
05:15
and this example, you'll notice that the phone has just 27% free storage space. This maze that 73% has been used
05:27
up by ATS in their data by pictures and videos. Audio fouls down those cachet data and Miss Ingredients. Other files we need to clear up space,
05:38
so let's go back to the home screen and click settings.
05:47
Next, we will click the General Tab
05:51
Scroll to the storage tab and select the space that you would like to clear. Once again, it could be pictures, videos, audio downloads and cash a data.
06:13
Our post assessment question is. What is mobile phone security Important?
06:19
Mobile phones have surpassed fixed phone lines.
06:23
Mobile phones or number one is our communication preference, and mobile phones are regularly ST with data stored on desktop computers
06:33
all of the above.
06:43
In today's brief lecture, we discovered trends related to mobile device use.
06:48
We learned how to secure and back up mobile devices, and we learned how to free up storage space on our mobile phones.
07:04
In our next video, we learn how to my great bone data to the cloud secure phone with our pin lock for log in
07:15
enable find my device
07:16
popped out of share information with third party

Up Next

End User Awareness

This is a introduction series to end user cyber and information security awareness. It's designed to teach the principles and practices that mobile, desktop and gaming device users need to keep themselves safe, both at work and at home.

Instructed By

Instructor Profile Image
Tonya Mead
Instructor