pl en

Smartphone - you have it or he you

Smartphone - you have it or he you

Smartphone - you have it or he you

Each person tries to protect his privacy, protecting, among others, his personal data.This is also done by companies that contain more information about their employees or contractors. How to protect yourself against identity theft or loss of data in a company. The current operating systems of our phones and computers are constantly being improved so that they become more and more secure. Unfortunately, our threats are available and the services available from the devices is very small. Understanding the danger by showing us what can happen is the key. The greater the number of users, the safer we are. This is because our data is constantly used and handled, is transferred by unauthorized persons, is limited, they only ask when and how we will react.

Information >

Cybersecurity training available online.
If you are interested, please contact us at


  • Why are our phones surveillance us?
  • What is metadata.
  • So are we able to protect our identity?
  • Who buys information about us and why?
  • How can a thief rob us via Facebook?
  • How to protect yourself against theft of our funds from the bank.
  • When will we be hacked? 

Questions and reservations:

Framework plan >

I. The essence of data protection. 

II. Threats related to information leakage. 

III. Safe User Guidelines: 

  1. Current system and application security updates.
  2. System password.
  3. Messages from them - limited "computer trust"
  4. Secrecy of personal data.
  5. Protection of processed data.
  6. Laptop on a corporate laptop in a public network 

IV. Disk encryption. 

  1. Necessity or paranoia?
  2. Appropriate selection of applications.
  3. Features and instructions for use. 

V. Password managers. 

  1. Threats versus benefits
  2. Choosing a secure application
  3. Features and user guide 

VI. Two-step verification. 

  1. Hardware security tokens
  2. Code generators
  3. SMS passwords 

VII. Useful addresses on the network. 

VIII. We on the internet - impact on our professional life. 

IX. Smartphone 

  1. Weak link in the security chain?
  2. Types of threats and their minimization (physical, hardware, software, operator, social engineering ..)
  3. Android and Apple in the enterprise - EMM, DPC, DEP