Our mobile devices are usually owned by the user, but managed by the organization. This shared ownership of device and data can create a number of policy and technology challenges. In this video, you’ll learn about user acceptance policies, mobile device managers, and some of the important aspects of on-boarding and off-boarding mobile devices.
One of the most trusted forms of communication is the telephone, and the bad guys are very good at taking advantage of our phones. In this video, you’ll learn about common vishing techniques and how you can prevent vishing.
While working at a customer’s desk, your mobile phone begins to ring. What is your most appropriate response?
You’re working on the installation of a new application at an end-users desk, and the user has stepped away for a few minutes. The user left their mobile phone on their desk, and it has started to ring. What should you do?