Securing Your Smartphone — How to Protect Your Most Vulnerable Device
Overview
Session 3: Securing Your Smartphone — How to Protect Your Most Vulnerable Device
If a hacker wanted to ruin your life, they’d start with your phone. This practical, easy-to-follow session explains how your smartphone can be used against you—and what you can do about it. From fake apps and stalkerware to account takeover and iCloud breaches, you’ll walk away knowing exactly how to lock down your mobile devices and keep your personal and business data safe.
Live and Interactive with time for Q&A.
If you are not able to register for this event, please contact the NCTSBDC at 940-498-6470 or LLogan@nctc.edu.
As co-owner and Principal Consultant with CyberTend, Andy provides comprehensive services to respond to incidents that include intellectual property theft, ransomware, business email compromise, data recovery, harassment and criminal cases. He possesses the industry knowledge to forensically collect, investigate, and present findings discovered through a myriad of sources that include mobile devices, computers, cloud storage, social media, and email systems. Andy holds two of the most senior level cyber security certification: Computer Information Systems Security Professional (CISSP) and Computer Information Security Auditor (CISA).
#smallbusiness #supportsmallbusinesses #shoplocal #smallbusinessesrock
Good to know
Highlights
- 1 hour 30 minutes
- Online
Location
Online event
Frequently asked questions
Organized by
Followers
--
Events
--
Hosting
--