MENU
pl en

Smartphone - you have it or he you


Smartphone - you have it or he you

Installments
Smartphone - you have it or he you

Each person tries to protect his privacy, protecting, among others, his personal data.This is also done by companies that contain more information about their employees or contractors. How to protect yourself against identity theft or loss of data in a company. The current operating systems of our phones and computers are constantly being improved so that they become more and more secure. Unfortunately, our threats are available and the services available from the devices is very small. Understanding the danger by showing us what can happen is the key. The greater the number of users, the safer we are. This is because our data is constantly used and handled, is transferred by unauthorized persons, is limited, they only ask when and how we will react.

Information >

TRAINING DATE
Cybersecurity training available online.
If you are interested, please contact us at centrumszkolen@notemaster.pl

DURATION 2 HOURSAT THE TRAINING, WE WILL ANSWER THE QUESTIONS: 

  • Why are our phones surveillance us?
  • What is metadata.
  • So are we able to protect our identity?
  • Who buys information about us and why?
  • How can a thief rob us via Facebook?
  • How to protect yourself against theft of our funds from the bank.
  • When will we be hacked? 

Questions and reservations: centrumszkolen@notemaster.pl

Framework plan >

ISSUE DISCUSSED DURING THE TRAINING:
I. The essence of data protection. 

II. Threats related to information leakage. 

III. Safe User Guidelines: 

  1. Current system and application security updates.
  2. System password.
  3. Messages from them - limited "computer trust"
  4. Secrecy of personal data.
  5. Protection of processed data.
  6. Laptop on a corporate laptop in a public network 

IV. Disk encryption. 

  1. Necessity or paranoia?
  2. Appropriate selection of applications.
  3. Features and instructions for use. 

V. Password managers. 

  1. Threats versus benefits
  2. Choosing a secure application
  3. Features and user guide 

VI. Two-step verification. 

  1. Hardware security tokens
  2. Code generators
  3. SMS passwords 

VII. Useful addresses on the network. 

VIII. We on the internet - impact on our professional life. 

IX. Smartphone 

  1. Weak link in the security chain?
  2. Types of threats and their minimization (physical, hardware, software, operator, social engineering ..)
  3. Android and Apple in the enterprise - EMM, DPC, DEP