Artwork

A tartalmat a Wendy Battles/James Tucciarone biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Wendy Battles/James Tucciarone vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Player FM - Podcast alkalmazás
Lépjen offline állapotba az Player FM alkalmazással!

5 Strategies to Protect Your Data if Your Mobile Device is Lost or Stolen

21:11
 
Megosztás
 

Manage episode 363492408 series 3395476
A tartalmat a Wendy Battles/James Tucciarone biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Wendy Battles/James Tucciarone vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

You use your phone to access all kinds of data. From viewing your bank balance to reading Yale emails to sharing information with family and friends.

So much of our life lives on our phones.
But is your data secure should it be lost or stolen?
The cost to replace it can be high. If the device contains High Risk Yale data, that data could be at risk. And imagine losing irreplaceable items that haven't been backed up like favorite vacation photos.
That's why it's so important to understand what we can do to minimize data loss. The good news? There are simple steps you can take to protect yourself.
In today's episode you'll learn:
▶️ Host Wendy's story of her lost device and what NOT to do
▶️ Surprising statistics about the cost of lost or stolen devices
▶️ Lost and stolen device "war stories"
▶️ 5 proactive steps you should take now, in the event your device is lost or stolen
▶️ Our buzzword of the day - encryption
And lots of other insights and information to protect the confidentiality, availability, and integrity of Yale data and systems (and your personal data too).
*********
Mentioned in this episode:
Why Reporting Suspicious Cyber Activity is Everyone's Responsibility: Insights from Yale's CISO Jeremy Rosenberg

Calls to Action:
Ready to build your cyber muscles, outsmart cybercriminals and hone your incident reporting skills?
Here are three simple actions you can take:

  • Review Yale's Report an Incident page about how to report suspicious behavior.
  • Set up password protection for your mobile device - it doesn't take long
  • Complete our Bee SAFE, Not Sorry puzzle to build incident reporting awareness. Submit your answer by May 31 for the chance to win a prize pack.

Send us a text

Learn more about Yale Cybersecurity Awareness at cybersecurity.yale.edu/awareness
Never miss an episode! Sign up to receive Bee Cyber Fit podcast alerts.

  continue reading

28 epizódok

Artwork
iconMegosztás
 
Manage episode 363492408 series 3395476
A tartalmat a Wendy Battles/James Tucciarone biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Wendy Battles/James Tucciarone vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

You use your phone to access all kinds of data. From viewing your bank balance to reading Yale emails to sharing information with family and friends.

So much of our life lives on our phones.
But is your data secure should it be lost or stolen?
The cost to replace it can be high. If the device contains High Risk Yale data, that data could be at risk. And imagine losing irreplaceable items that haven't been backed up like favorite vacation photos.
That's why it's so important to understand what we can do to minimize data loss. The good news? There are simple steps you can take to protect yourself.
In today's episode you'll learn:
▶️ Host Wendy's story of her lost device and what NOT to do
▶️ Surprising statistics about the cost of lost or stolen devices
▶️ Lost and stolen device "war stories"
▶️ 5 proactive steps you should take now, in the event your device is lost or stolen
▶️ Our buzzword of the day - encryption
And lots of other insights and information to protect the confidentiality, availability, and integrity of Yale data and systems (and your personal data too).
*********
Mentioned in this episode:
Why Reporting Suspicious Cyber Activity is Everyone's Responsibility: Insights from Yale's CISO Jeremy Rosenberg

Calls to Action:
Ready to build your cyber muscles, outsmart cybercriminals and hone your incident reporting skills?
Here are three simple actions you can take:

  • Review Yale's Report an Incident page about how to report suspicious behavior.
  • Set up password protection for your mobile device - it doesn't take long
  • Complete our Bee SAFE, Not Sorry puzzle to build incident reporting awareness. Submit your answer by May 31 for the chance to win a prize pack.

Send us a text

Learn more about Yale Cybersecurity Awareness at cybersecurity.yale.edu/awareness
Never miss an episode! Sign up to receive Bee Cyber Fit podcast alerts.

  continue reading

28 epizódok

Minden epizód

×
 
Loading …

Üdvözlünk a Player FM-nél!

A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.

 

Gyors referencia kézikönyv