Securing Your Smartphone — How to Protect Your Most Vulnerable Device
Sales end soon

Securing Your Smartphone — How to Protect Your Most Vulnerable Device

By North Central Texas SBDC
Online event

Overview

If you are not able to register for this event, please contact the NCTSBDC at 940-498-6470 or LLogan@nctc.edu.

Session 3: Securing Your Smartphone — How to Protect Your Most Vulnerable Device

If a hacker wanted to ruin your life, they’d start with your phone. This practical, easy-to-follow session explains how your smartphone can be used against you—and what you can do about it. From fake apps and stalkerware to account takeover and iCloud breaches, you’ll walk away knowing exactly how to lock down your mobile devices and keep your personal and business data safe.

Live and Interactive with time for Q&A.

If you are not able to register for this event, please contact the NCTSBDC at 940-498-6470 or LLogan@nctc.edu.

As co-owner and Principal Consultant with CyberTend, Andy provides comprehensive services to respond to incidents that include intellectual property theft, ransomware, business email compromise, data recovery, harassment and criminal cases. He possesses the industry knowledge to forensically collect, investigate, and present findings discovered through a myriad of sources that include mobile devices, computers, cloud storage, social media, and email systems. Andy holds two of the most senior level cyber security certification: Computer Information Systems Security Professional (CISSP) and Computer Information Security Auditor (CISA).

#smallbusiness #supportsmallbusinesses #shoplocal #smallbusinessesrock

Category: Science & Tech, High Tech

Good to know

Highlights

  • 1 hour 30 minutes
  • Online

Location

Online event

Frequently asked questions

Organized by

North Central Texas SBDC

Followers

--

Events

--

Hosting

--

Free
Nov 5 · 9:30 AM PST