1 hour 1 minute
so welcome back to mobile device security course. And in previous video, I have been talking about how to secure mobile devices with emphasis on mobile phones and tablets.
And in this video I will talk about specifics on securing notebooks. So
the first thing you have to be aware off when you're using your notebook
is Toby wear off fishing. So I have already talked about what the fishing is,
and there are some things that you have toe, especially take care when using no books, because at this point, the vast majority of phishing attacks are directed that you're no books,
especially if you're using Windows operating system or even Apple operating systems. Why? Because the majority off email today is still read through,
UH, no books or PC's, especially the important ones. So the ones that
so the people that can be hacked with most advantage the hackers are people working for big companies that have lot of money that can be ransomed. That can be
you can you can tap into their email banking system and clear their accounts off money or whatever.
fishing is today still mostly meant to harm people with some kind of personal computer.
So if you receive an email, that doesn't look 100% good. And this is an example of email that I have sent to myself opened in my alcoholic email client and you see that there is a body of text and then there is, ah,
somebody with my name and last name sending me,
um, information about what should I do with my corporate mileage tracking reports?
Of course, this could be somebody else. Um, and actually that this email can be disguised This guy's so that it seems that it came from my colleague, but it actually was coming from another place. So I need to first look at the from field.
I have to make sure that it's sent from some of the actually from my company.
Although this is not 100% proof, so you cannot be sure about that. They can fake email address, and, um
then, in this email, there is an attachment. And there is also
And, uh, yeah, these are
things that you should avoid if you're not 100% sure. Of course there are filters. If you're using company email, that will probably prevent most of these things from coming true to you
and the, but you still should be aware. So one of the things I mentioned is that you shouldn't open your emails in HTML format because in that way you cannot be infected by malware. That is, inside the body off the message.
And that's the first thing if and the actually zero thing is that you've seen an email and doesn't look 100% okay,
if you have i t security or anti for anti phishing team in your company, contact them first, so send this email to them as an attachment of Save the Male. Ah, send email to the whoever is in charge of checking it fishing
as an attachments have done forward. It's just to them because then
all the infections things would be, well being that female, um,
and wait for a response from them some. If it's something urgent and you're expecting the resurgent there, they're some of the things you can do. So, for example,
if you need to open the link,
it would be nice if you could use browser that work in virtualized environment.
We're talking about no books only of course, because these things usually work under windows only at this point,
and I mean Windows operating system and, uh, that that way, even if you get some kind of infection by clicking on a link, it will stay in a virtual environment. Once you close the tab or browser
at that, infection will be lost together with that virtual machine in which
the browser was opened
and the the last thing that you can do. If there is an attachment, just save that attachment toe desktop for somewhere on your hard drive and then scan it and Onley, then open it. So
don't open it if you have not been sure that the file has been scanned, because if you open it directly from your message, it might avoid some kind of anti virus or anti Melber skinny.
when the file is in this, you just right click. You will probably find the option to scan the selected item viruses that file, and then once you do it, then who opened the file not
So the other thing that you can use if you're using no book toe, protect yourself from
abused during usage off by five
is to use VPN. Of course, VPN is something that your network administrator ICTY administrator has to provide for you and they will probably give you some software and instructions how to use it. But let me just explain to you how weepy and work. So if you're on the public network and you just log on it, you just make a connection
and you connected.
And then you want to access your Web mail, for example,
and your us for passwords and you type in your passport, you presenter.
And what happens is that your password in unencrypted form is going through local WiFi network and then to the Internet.
And that's bad.
So you don't want to do that?
Some of these listening on that. Why, five? Instead of this router in the middle, there is a PC. They can get your password and the damage has already been done.
So what the VPN is doing is that instead of correcting directly to the Internet,
you actually have ah server
of your company and your connecting to that server.
So now when you type in the password, any kind of typing
it goes over the network not in unencrypted but in encrypted form. And then it gets encrypted. Benin Creatures Company server.
in this case, you are protected because all the communication between your PC and your company's server, whatever secure server you're using is encrypted,
the part of communication that is used to establish dealing between your PC
and you're in the server in question. So even that part of communication is encrypted, and
theoretically possible. But in real life, it's not possible for somebody to help your communication if you're using VPN, so if you are provided with VPN, use it whenever you're connected to WiFi.
Some companies make it mandatory, but in some cases given to you just as an opportunity. If you're giving that opportunity, use it absolutely every time because it is enough for hackers just once
to tap Interior PC while it's communicating over unprotected network and with damages.
So in this media, you have learned about specific actions for protection or no books, not just know desktop PC's. This is just about no books because notebook connected WiFi networks and no books are used on lots of different places in which there is no secure connection
End User Cyber Fundamentals
This End User Cyber Fundamentals course covers Internet risks such as typosquatting, website spoofing, drive-by ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
Android Development Fundamentals
Android users dominate the mobile market, so the demand for Android developers is high. This ...
4 CEU/CPE Hours Available
Certificate of Completion Offered