Secure your mobile and portable devices Video
Are you worried about the security of your mobile and portable devices? Discover essential tips to protect your sensitive information from theft and unauthorized access. Learn about password locking, encryption, and the importance of secure connections. Equip yourself with the knowledge to safeguard your devices today!
- 00:50
- 15 views
-
Recovering deleted items (Recycle bin and Second-stage recycle bin)
- 2:18
- Viewed 6432 times
-
Granting access to the SharePoint site to someone outside the company
- 3:46
- Viewed 3799 times
-
Do I share with OneDrive, SharePoint, or TEAMS?
- 2:24
- Viewed 3645 times
-
Understanding the different types and roles of team sites in SharePoint
- 3:05
- Viewed 3281 times
-
Targeting content using a specific audience
- 3:35
- Viewed 3237 times
-
Checking the granted shares
- 2:27
- Viewed 3169 times
-
Restricting a document to read-only mode (Extract a document)
- 2:05
- Viewed 3103 times
-
Add channels and tabs
- 1:40
- Viewed 1743 times
-
Create private and shared channels
- 1:52
- Viewed 1559 times
-
Create a permission group
- 2:11
- Viewed 1374 times
-
Understand and Secure Information Sharing in Instant Messaging
- 2:38
- Viewed 1216 times
-
Use version history
- 1:57
- Viewed 1117 times
-
Share a document to someone outside of my SharePoint site
- 3:57
- Viewed 1089 times
-
SharePoint permission levels
- 2:16
- Viewed 1076 times
-
Restrict a Document to Certain Team Members
- 1:50
- Viewed 1020 times
-
Restrict a Document to Read-Only
- 0:58
- Viewed 1013 times
-
Secure Teams Upon Creation
- 2:57
- Viewed 990 times
-
Manage Privacy in Private Channels
- 2:34
- Viewed 979 times
-
Secure a Shared Document with a Password
- 1:28
- Viewed 963 times
-
Check Granted Shares
- 00:48
- Viewed 742 times
-
Modify Sharing Rules
- 00:53
- Viewed 649 times
-
Protect My Document with a Password and Expiration Date
- 01:02
- Viewed 643 times
-
Use Recycle Bins to Restore Documents
- 01:49
- Viewed 637 times
-
Share and Collaborate OneDrive
- 02:45
- Viewed 613 times
-
Restore Your OneDrive Space
- 01:42
- Viewed 602 times
-
Best Security Practices on OneDrive
- 01:27
- Viewed 593 times
-
Block a sender
- 01:54
- Viewed 539 times
-
Avoid Abusive Document Sharing
- 00:57
- Viewed 505 times
-
Prevent the forwarding of an email
- 01:01
- Viewed 472 times
-
Share a document securely with Outlook
- 02:21
- Viewed 449 times
-
Identify a fraudulent email
- 02:06
- Viewed 423 times
-
Provide an overview of best security practices in Outlook
- 01:08
- Viewed 412 times
-
Guide to Using the Microsoft Authenticator App
- 01:47
- Viewed 378 times
-
Protect an email by encrypting
- 01:10
- Viewed 377 times
-
Concept of Multi-Factor Authentication
- 01:51
- Viewed 359 times
-
Turn on Multi-Factor Authentication in the Admin Section
- 02:07
- Viewed 298 times
-
Manual Activation of Multi-Factor Authentication
- 01:40
- Viewed 259 times
-
Are all files safe as long as I open them with trusted software?
- 01:24
- Viewed 134 times
-
Is contactless payment safe ?
- 01:26
- Viewed 133 times
-
Is scanning a QR code always safe?
- 01:21
- Viewed 112 times
-
Is a strong password all I need to stay safe?
- 01:55
- Viewed 99 times
-
Is cloud storage less secure than my personal computer?
- 01:37
- Viewed 99 times
-
Can I safely click a link in a message?
- 01:46
- Viewed 97 times
-
Is public Wi-Fi safe if no password is required?
- 01:26
- Viewed 97 times
-
Can my mobile apps do anything without my permission?
- 01:19
- Viewed 92 times
-
Does connecting to a well-known website guarantee its safety?
- 01:27
- Viewed 91 times
-
Will I know what to do if I get hacked?
- 01:16
- Viewed 90 times
-
Is a firewall the same as an antivirus?
- 01:31
- Viewed 89 times
-
Is my password secure if it contains an @ and a number?
- 01:41
- Viewed 87 times
-
Is a free antivirus good enough?
- 01:38
- Viewed 87 times
-
Do I have to be an IT expert to protect myself?
- 01:14
- Viewed 85 times
-
Does private browsing make me anonymous?
- 01:27
- Viewed 84 times
-
Are updates useless if everything works fine?
- 01:28
- Viewed 82 times
-
Do cybercriminals only target large companies?
- 01:21
- Viewed 81 times
-
Am I safe online if I’m careful?
- 01:22
- Viewed 80 times
-
Is a hacker always a cybercriminal?
- 01:31
- Viewed 80 times
-
Does my antivirus block all threats?
- 01:46
- Viewed 78 times
-
Is the sender’s email address enough to verify a message?
- 01:29
- Viewed 69 times
-
Are online payments riskier than in-store ones?
- 01:21
- Viewed 54 times
-
Is signing in with Google or Facebook a bad idea ?
- 01:34
- Viewed 43 times
-
What is a ransomware attack ?
- 00:29
- Viewed 21 times
-
What is cybersecurity?
- 00:52
- Viewed 20 times
-
How does two factor authentication ?
- 00:48
- Viewed 20 times
-
Ransomware
- 00:60
- Viewed 20 times
-
Best practices protecting data
- 00:25
- Viewed 19 times
-
Web browser
- 00:41
- Viewed 18 times
-
Configure automatic update
- 00:51
- Viewed 18 times
-
Key figures and facts abouts cybersecurity
- 01:26
- Viewed 17 times
-
Extensions
- 00:26
- Viewed 17 times
-
What is a Ddos attack ?
- 00:29
- Viewed 16 times
-
How browser works
- 00:42
- Viewed 16 times
-
The importance of chossing a local account
- 00:40
- Viewed 16 times
-
How url filtering work?
- 00:54
- Viewed 16 times
-
BYOD - risks
- 00:41
- Viewed 16 times
-
What is a virus or malware?
- 01:27
- Viewed 15 times
-
What is two factor authentication?
- 00:33
- Viewed 15 times
-
Advantages of two factor authentications
- 00:47
- Viewed 15 times
-
In search vulnerability
- 00:32
- Viewed 15 times
-
what is vulnerability ?
- 00:27
- Viewed 15 times
-
How are a system's security vulnerabilities revealed?
- 00:40
- Viewed 15 times
-
Vulnerability communication process
- 00:26
- Viewed 15 times
-
Updating personal operating systems
- 00:58
- Viewed 15 times
-
Recognize good and bad passwords
- 01:04
- Viewed 14 times
-
Phishing
- 00:50
- Viewed 14 times
-
Security through obscurity
- 00:35
- Viewed 14 times
-
Use of secuirty software
- 00:53
- Viewed 14 times
-
Protect sensitive data personal devices
- 00:49
- Viewed 14 times
-
What is a phishing attack?
- 01:27
- Viewed 13 times
-
Parental controls
- 00:31
- Viewed 13 times
-
Secure your mobile and portable devices
- 00:50
- Viewed 15 times
-
Protect sensitive data personal devices
- 00:49
- Viewed 14 times
-
Best practices protecting data
- 00:25
- Viewed 19 times
-
BYOD - risks
- 00:41
- Viewed 16 times
-
How url filtering work?
- 00:54
- Viewed 16 times
-
Use of secuirty software
- 00:53
- Viewed 14 times
-
Configure automatic update
- 00:51
- Viewed 18 times
-
The importance of chossing a local account
- 00:40
- Viewed 16 times
-
Updating personal operating systems
- 00:58
- Viewed 15 times
-
Vulnerability communication process
- 00:26
- Viewed 15 times
-
How are a system's security vulnerabilities revealed?
- 00:40
- Viewed 15 times
-
Security through obscurity
- 00:35
- Viewed 14 times
-
what is vulnerability ?
- 00:27
- Viewed 15 times
-
In search vulnerability
- 00:32
- Viewed 15 times
-
Extensions
- 00:26
- Viewed 17 times
-
Parental controls
- 00:31
- Viewed 13 times
-
How browser works
- 00:42
- Viewed 16 times
-
Web browser
- 00:41
- Viewed 18 times
-
Ransomware
- 00:60
- Viewed 20 times
-
Phishing
- 00:50
- Viewed 14 times
-
Advantages of two factor authentications
- 00:47
- Viewed 15 times
-
How does two factor authentication ?
- 00:48
- Viewed 20 times
-
What is two factor authentication?
- 00:33
- Viewed 15 times
-
Recognize good and bad passwords
- 01:04
- Viewed 14 times
-
What is a ransomware attack ?
- 00:29
- Viewed 21 times
-
What is a Ddos attack ?
- 00:29
- Viewed 16 times
-
What is a virus or malware?
- 01:27
- Viewed 15 times
-
What is a phishing attack?
- 01:27
- Viewed 13 times
-
Key figures and facts abouts cybersecurity
- 01:26
- Viewed 17 times
-
What is cybersecurity?
- 00:52
- Viewed 20 times
-
Is a hacker always a cybercriminal?
- 01:31
- Viewed 80 times
-
Will I know what to do if I get hacked?
- 01:16
- Viewed 90 times
-
Do I have to be an IT expert to protect myself?
- 01:14
- Viewed 85 times
-
Do cybercriminals only target large companies?
- 01:21
- Viewed 81 times
-
Are all files safe as long as I open them with trusted software?
- 01:24
- Viewed 134 times
-
Is contactless payment safe ?
- 01:26
- Viewed 133 times
-
Are online payments riskier than in-store ones?
- 01:21
- Viewed 54 times
-
Is cloud storage less secure than my personal computer?
- 01:37
- Viewed 99 times
-
Is scanning a QR code always safe?
- 01:21
- Viewed 112 times
-
Can my mobile apps do anything without my permission?
- 01:19
- Viewed 92 times
-
Is public Wi-Fi safe if no password is required?
- 01:26
- Viewed 97 times
-
Is the sender’s email address enough to verify a message?
- 01:29
- Viewed 69 times
-
Can I safely click a link in a message?
- 01:46
- Viewed 97 times
-
Does connecting to a well-known website guarantee its safety?
- 01:27
- Viewed 91 times
-
Am I safe online if I’m careful?
- 01:22
- Viewed 80 times
-
Does private browsing make me anonymous?
- 01:27
- Viewed 84 times
-
Are updates useless if everything works fine?
- 01:28
- Viewed 82 times
-
Is a firewall the same as an antivirus?
- 01:31
- Viewed 89 times
-
Does my antivirus block all threats?
- 01:46
- Viewed 78 times
-
Is a free antivirus good enough?
- 01:38
- Viewed 87 times
-
Is signing in with Google or Facebook a bad idea ?
- 01:34
- Viewed 43 times
-
Is my password secure if it contains an @ and a number?
- 01:41
- Viewed 87 times
-
Is a strong password all I need to stay safe?
- 01:55
- Viewed 99 times
Objectifs :
The objective of this video is to educate viewers on the importance of securing mobile and portable devices to protect sensitive information from loss, theft, and unauthorized access.
Chapitres :
-
Importance of Securing Mobile Devices
Portable devices often contain sensitive information, making them prime targets for theft or loss. When these devices are compromised, the data they hold can be exposed to malicious individuals, leading to potential misuse. -
Protective Measures
To safeguard your devices, it is crucial to enable password locking and data encryption. These security measures significantly increase the difficulty for unauthorized persons to access your information. -
Using Devices in Public Places
When using your devices in public areas, it is essential to prioritize secure connections. Utilizing a Virtual Private Network (VPN) can help encrypt your communications, thereby reducing risks associated with public Wi-Fi networks. -
Separation of Professional and Personal Use
It is advisable to separate professional and personal use on your mobile devices. This can help mitigate risks associated with data exposure. Additionally, only install applications that are company-approved and avoid downloading software from unsecure sources.
FAQ :
Why is it important to secure portable devices?
Securing portable devices is crucial because they often contain sensitive information. If lost or stolen, this data can be accessed by malicious individuals, leading to identity theft or data breaches.
What are the best practices for securing my mobile device?
Best practices include enabling password locking, using data encryption, prioritizing secure connections, using a VPN on public networks, and only installing company-approved applications.
How does a VPN protect my data?
A VPN encrypts your internet connection, making it difficult for hackers to intercept your data, especially when using public Wi-Fi networks.
What should I do if I suspect my device has been compromised?
If you suspect your device has been compromised, immediately change your passwords, enable remote wipe features if available, and contact your IT department or a security professional for assistance.
Can I use personal applications on my work device?
It's advisable to separate professional and personal use on your mobile devices. Only install applications that are approved by your company to minimize security risks.
Quelques cas d'usages :
Securing Company Laptops
A company implements password locking and data encryption on all employee laptops to protect sensitive client information from unauthorized access, especially when employees work remotely or travel.
Using VPN for Remote Work
Employees working from home use a VPN to secure their internet connection, ensuring that their communications and data remain private while accessing company resources.
Public Wi-Fi Safety
A marketing team frequently travels and uses public Wi-Fi in cafes. They ensure their devices are secured with password locks and only connect through a VPN to protect their marketing strategies and client data.
App Management in Corporations
A corporation establishes a policy that only allows the installation of company-approved applications on employee devices, reducing the risk of malware and data breaches from unsecure sources.
Data Protection Training
A company conducts training sessions for employees on the importance of securing their mobile devices, emphasizing the use of encryption and secure connections to protect sensitive information.
Glossaire :
Portable devices
Devices that are easily transportable, such as smartphones, tablets, and laptops, which often store sensitive information.
Sensitive information
Data that must be protected from unauthorized access due to its confidential nature, such as personal identification, financial details, or proprietary business information.
Password locking
A security feature that requires a password to access a device, helping to prevent unauthorized use.
Data encryption
The process of converting information into a code to prevent unauthorized access, ensuring that only authorized users can read the data.
VPN (Virtual Private Network)
A service that creates a secure, encrypted connection over a less secure network, such as the Internet, protecting your online activities from eavesdropping.
Public Wi-Fi networks
Wireless internet connections that are available to the public, often found in places like cafes, airports, and libraries, which can pose security risks.
Company approved applications
Software applications that have been vetted and authorized by an organization for use on company devices, ensuring security and compliance.
Unsecure sources
Websites or platforms that do not provide adequate security measures, making them risky for downloading software or applications.
Cette formation pourrait intéresser votre entreprise ?
Mandarine Academy vous offre la possibilité d'obtenir des catalogues complets et actualisés, réalisés par nos formateurs experts dans différents domaines pour votre entreprise