1 hour 1 minute
Welcome back to mobile device Security Course. My name is Melanie Savage, and I'm going to just do a short recap on what you have been able to learn in this course.
at the beginning, I was talking about why security of mobile devices so important.
Um, if you remember, the main reason is because we are all using mobile devices all the time. Even people working for companies, they're usually issued the company notebook, and they are using this notebook to connect to the network from lots of different places and which makes them vulnerable
and which compromises security of devices.
So in the
second part of this course, you have been ableto see and learn how and in which way cybercriminals can compromise your mobile device. So the techniques and some specifics regarding mobile phones, tablets and noble species.
Then if you're using the company phone or company mobile device.
There have been some responses. There have been some talks about responsibilities regarding who is responsible for what?
So who is responsible for
not behaving crazy that you and the on the other side I t. And I t security in your company. They're responsible for putting all the software protection on your device that can help you stay secure. One of those
is the one that have mentioned in the last one which is using VPN. So in the last part of this course, I have been talking about methods for making your mobile device secure
and, ah, this methodology included, uh, that you use VPN if you have it in stolen your device every time when you connect to some network that is not your corporate network or your home network for which can be
relatively sure that it's safe.
So at the end, I just hope that you have learned a little bit more about security of mobile devices and that you will able to behave more responsibly when you use your mobile device in different locations and situations. Think you were much for listening this course