Phones have evolved to be portable computing devices that contain a tremendous amount of information about our personal and work life. The data contained on your phone, tablet, or whatever future device you may have is a target for criminals.
The evolution of the cell phone offered us mobility with the ability to still communicate with family and with co-workers in the office. In this course, Security Awareness: Mobile Devices, you'll learn how to protect your business and yourself by gaining knowledge of mobile device attacks. First, you'll delve into how to identify those specific attacks. Next, you’ll explore how to stop from becoming a victim of these types of attacks. Finally, you'll discover how to be more proactive in avoiding a mobile device attack. When you’re finished with this course, you'll have the required skills and knowledge of security awareness needed to protect against mobile device attacks.
Jason Helmick is an author for Pluralsight. His IT career spans more than 25 years or enterprise consulting on a variety of technologies, with a focus on strategic IT business planning. He’s a highly successful IT author, columnist, lecturer, and instructor, specializing in automation practices for the IT pro.
Course Overview Hi. I'm Jason Helmick, an author here at Pluralsight, and welcome to my course, Mobile Device Security. You know the evolution of the cell phone has offered us mobility with the ability to still communicate with family and coworkers in the office. Conversations with customers don't have to wait until you get to the office any more, we can have them at any time. Today those phones have evolved to portable computing devices that have a tremendous amount of power and information about our personal and work life, so the data contained on your phone, your tablet, your smartwatch, whatever future device you may have, is a target for cyber criminals. So in this course you will learn how to protect you business and yourself with gaining knowledge of mobile device attacks. Learn to identify those attacks and how to stop from falling victim. You'll also learn how to be more proactive in avoiding these types of attacks. So join me on this journey to start learning about cyber security and mobile device security. Here at Pluralsight, we love learning and hope that you do too.
When You Just Carried Phones One of the challenges to mobile device security is that a lot of us don't think of our mobile devices as computers because we come from a historical bygone day of where phones were just telephones. And that's kind of what we want to look at in this module is first of all the difference between when we used phones for communication and now that we use them as computation. And one of the challenges is the industry that invented and created all of our mobile devices far out paced our thoughts about security. In fact, security in a lot of instances was an afterthought. And we want to take a look at what those mobile devices contain, the data that might be on them that cyber criminals what to get access to. So let's get started with communication and computation.
The Security Threats You Face Now that we agree that your mobile device is just as important to you as any computer, for that matter, because it contains important data, let's take a look at, well, some of the things you could possibly be facing and how to deal with it. And that's what we're going to do in this module, is we're going to take a look at physical access to your mobile devices, that's one of the problems with mobile devices is that they're mobile and we might lose them. And while you're using your mobile device, just like any other computer, it is risky and it can get attacked by malware, and also the communications between your mobile device and the internet can be intercepted, mobile devices more than anything else. So, we want to take a look at that as well.
Company Owned Mobile Device Security Throughout my IT career, one of the focuses of one of my particular job roles has been on mobile devices and security and some of the issues wrapped around that, some of the legal issues and things that can occur with a business and mobile devices. And this is a little bit challenging for a business beyond what you would think of just the risk of infection and release of confidential data. It starts to get into legal matters, whether you own the device and you use it of for work or the company has supplied you with a device that they own to use for work. We start to run into a lot of the same issue with the device. It isn't just about protecting the device from malware, it's about what the end user might do with the device. So, let's dive in and take look at this. Here's what we're going to focus on. We're going to focus on the risks to the business from cyber criminals or hackers, but also some of the risks that a business faces from its own employees when it comes to mobile devices and how the company views defending itself. This is a concept called defense in depth and your companies are going to apply several different measures to try to prevent security issues. Now, a lot of your companies, the company you may work for has security teams and we want to talk about what they can do, and then take a look at some of things like mobile device policies. What policies do your companies have in place in regards to your mobile devices. Some of that might be a little bit surprising, and also some of the countermeasures that a company might go through. So let's get started with the risks to both business from hackers and from employees.
The Master Plan to Protect Mobile Devices Throughout this course on mobile devices you've learned a lot about not only the device attacks, but some of the things you can do both personally and what'll happen in your business to prevent some of those attacks. This is kind of a summary of that, along with, well, who to let know if something goes wrong. So, as important as our mobile devices are, and include your laptops into that, and as important as those communications are, we want to prevent people from getting malware on our devices. We want to prevent ourself from losing those devices if at all possible, even though that sometimes happens, and we certainly want to prevent people from intercepting the communications from those mobile devices. And so, that's what we want to take look at in this module is how to be safe with your mobile devices, and if something does go wrong, who to notify. If you're at work and you're doing work on a mobile device, a tablet, and something goes wrong, you think you may have malware, who do you report to the business? Who do you report to if it's a personal attack? And worst-case scenario, you can always report it to the FBI. So let's dive in with how to be safe with mobile devices.