Time
1 hour 1 minute
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:01
in previous lesson. You have seen the techniques about that. They're used for hacking the notebooks and tablets.
00:08
And in this
00:11
a lesson on video. I'm going to talk about recent built responsibilities off people.
00:17
Ah, that are involving mobile security. So if you're,
00:22
ah
00:24
basically using your phone by yourself. So if it's your private funding off course, you are the only responsible person, maybe some people from the network in terms of protecting the network. But when comes to the phone itself, it's your responsibility.
00:38
So in this video you will see who is responsible for mobile device security. And if it's company issued or cooperate issued from
00:47
then, I'm going to talk about responsibilities off I T departments, meaning I T and I t Security Department
00:54
and, of course, responsibilities of users.
00:58
So
01:00
regarding mobile device, the greatest responsibility for security of more well devices yours
01:07
because you are all
01:08
time in possession of the device. So
01:12
first thing is, don't lose it, so behave
01:17
responsibly. Then don't let it be stolen.
01:21
And basically don't do any crazy things regarding that device. So don't let it
01:27
don't test if it can be dropped from. I don't know 1.5 meter height.
01:34
Although maybe the specifications say can,
01:38
um don't, uh, leave it unattended.
01:44
Um, and even if the
01:48
this place broken,
01:49
uh, don't think that the wise can The data from your device cannot be access. So, um,
01:57
don't throw it away.
01:59
Take it to the
02:00
because somebody can just get your
02:04
broken device. Replace the display, which is not working, but the rest of devices working and they can access the data. Or they can just disassemble your device, get access to the mother board and then find a way to collect data directly from the
02:22
basically a computer inside your mobile phone
02:25
who
02:27
none behave crazy.
02:29
Ah, with your mobile device, like mobile phone or tablet or something.
02:34
Um,
02:36
don't use public charges or on secure public WiFi.
02:39
So
02:40
these things are No, no.
02:43
Unless you have some kind of protection
02:46
or it the thing I'm going to talk about in the future videos of this course.
02:54
Then the next thing you shouldn't do
02:58
is never open the mail that looks like a phishing email. You should you are responsible to learn how to recognize them. If you work in a company, you should probably get some kind of training if you don't ask for it
03:13
and tell somebody for my tea. Okay, guys, can you give us give me or
03:19
me and my colleagues that work together in my team?
03:23
Can you explain to us how the phishing email looks, how to recognize them and how to avoid them?
03:30
And the last thing is, don't you simple or generic passwords?
03:36
So, uh, we're not talking about some kind of password that is used for unlocking your phone. I'm talking about, For example, your email account passwords.
03:49
Um,
03:50
simple. Ordinary passports are easy to crack
03:53
and there is a rule of thumb been in creating passwords, which is the longer it is safer, it is.
04:01
So, uh, here is an example, very bad. And the really good password
04:08
And the 1st 1 it doesn't matter that it's, ah that I have replaced letters with numbers and I have played with
04:15
capital and the lower case letters.
04:19
The one the 1st 1 is not safe. The 2nd 1 is no longer a password. It is what we call pass phrase.
04:28
It's actually a sentence. It can have spaces as well.
04:31
Andi, it's something that you can easily remember,
04:36
but its long enough for a hacker to make for them to make it difficult to crack.
04:45
Also, if you know a second language, you can add something in debt language as well in your password,
04:51
which makes it extra extra protected.
04:56
So this is about you
04:59
now. I T and I t Security have responsibility as well, and there are a couple of them.
05:05
So 1st 1 is to install won T virus, anti malware and all software needed to protect your device. So basically,
05:14
they need to fill your device with all the software needed to make your device safe as much as it is possible.
05:23
The other thing is, they need to configure your device so it cannot be so. Basically,
05:28
they are like like mechanics that need to tinker with your device
05:32
and make it more secure.
05:35
So there are things for them. Police feats of PC. There are ways to protect the PC. One of the first things that I'm going to mention is your Every PC has bias, and they need to add by spots for to the device.
05:51
And of course, they have to make sure that allowed the security updates are regularly installed and stuff like that. So
05:59
it's a process, and your mobile devices have to be updated that they can do it. They can do the updates so that you don't even see they can be installed in background and months you restart your device, it's working.
06:14
So, uh,
06:15
you need a mechanic for your moment device
06:19
and the last time the thing they have to do they should be doing Sometimes they don't is to give you instructions on things you shouldn't be doing your with your mobile device and things you have to do with your mobile device to make it secure. So the things that have been talking about
06:38
in the previous slide that were you have seen the things you shouldn't do
06:43
with your mobile device. There are details to it. And if you're using a company mobile device regardless, if it's a tablet or mobile phone or notebook, there should be some kind of training devised for you so that you can look it online or you have can have a real life
07:02
coach trainer telling you how to do these things. In best case, there should be a test and the end so that they can check if you have bean being attention and actually learned something from the training.
07:18
So these are the responsibilities of different people in your company. If you're using company phone
07:26
and at the end of this lesson, just a reminder that
07:30
in this video have learned what are your employer's responsibility if you're using company device and what are your responsibilities and these are the most important ones.

Up Next

End User Mobile Security

This course should give you basic ideas on importance of mobile device security, what needs to be protected on mobile device, who should be responsible for mobile device security and what are basic thing you need to do in order to reach that goal.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor