Artwork

Kandungan disediakan oleh Wendy Battles/James Tucciarone. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Wendy Battles/James Tucciarone atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
Player FM - Aplikasi Podcast
Pergi ke luar talian dengan aplikasi Player FM !

5 Strategies to Protect Your Data if Your Mobile Device is Lost or Stolen

21:11
 
Kongsi
 

Manage episode 363492408 series 3395476
Kandungan disediakan oleh Wendy Battles/James Tucciarone. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Wendy Battles/James Tucciarone atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.

You use your phone to access all kinds of data. From viewing your bank balance to reading Yale emails to sharing information with family and friends.

So much of our life lives on our phones.
But is your data secure should it be lost or stolen?
The cost to replace it can be high. If the device contains High Risk Yale data, that data could be at risk. And imagine losing irreplaceable items that haven't been backed up like favorite vacation photos.
That's why it's so important to understand what we can do to minimize data loss. The good news? There are simple steps you can take to protect yourself.
In today's episode you'll learn:
▶️ Host Wendy's story of her lost device and what NOT to do
▶️ Surprising statistics about the cost of lost or stolen devices
▶️ Lost and stolen device "war stories"
▶️ 5 proactive steps you should take now, in the event your device is lost or stolen
▶️ Our buzzword of the day - encryption
And lots of other insights and information to protect the confidentiality, availability, and integrity of Yale data and systems (and your personal data too).
*********
Mentioned in this episode:
Why Reporting Suspicious Cyber Activity is Everyone's Responsibility: Insights from Yale's CISO Jeremy Rosenberg

Calls to Action:
Ready to build your cyber muscles, outsmart cybercriminals and hone your incident reporting skills?
Here are three simple actions you can take:

  • Review Yale's Report an Incident page about how to report suspicious behavior.
  • Set up password protection for your mobile device - it doesn't take long
  • Complete our Bee SAFE, Not Sorry puzzle to build incident reporting awareness. Submit your answer by May 31 for the chance to win a prize pack.

Send us a text

Learn more about Yale Cybersecurity Awareness at cybersecurity.yale.edu/awareness
Never miss an episode! Sign up to receive Bee Cyber Fit podcast alerts.

  continue reading

28 episod

Artwork
iconKongsi
 
Manage episode 363492408 series 3395476
Kandungan disediakan oleh Wendy Battles/James Tucciarone. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Wendy Battles/James Tucciarone atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.

You use your phone to access all kinds of data. From viewing your bank balance to reading Yale emails to sharing information with family and friends.

So much of our life lives on our phones.
But is your data secure should it be lost or stolen?
The cost to replace it can be high. If the device contains High Risk Yale data, that data could be at risk. And imagine losing irreplaceable items that haven't been backed up like favorite vacation photos.
That's why it's so important to understand what we can do to minimize data loss. The good news? There are simple steps you can take to protect yourself.
In today's episode you'll learn:
▶️ Host Wendy's story of her lost device and what NOT to do
▶️ Surprising statistics about the cost of lost or stolen devices
▶️ Lost and stolen device "war stories"
▶️ 5 proactive steps you should take now, in the event your device is lost or stolen
▶️ Our buzzword of the day - encryption
And lots of other insights and information to protect the confidentiality, availability, and integrity of Yale data and systems (and your personal data too).
*********
Mentioned in this episode:
Why Reporting Suspicious Cyber Activity is Everyone's Responsibility: Insights from Yale's CISO Jeremy Rosenberg

Calls to Action:
Ready to build your cyber muscles, outsmart cybercriminals and hone your incident reporting skills?
Here are three simple actions you can take:

  • Review Yale's Report an Incident page about how to report suspicious behavior.
  • Set up password protection for your mobile device - it doesn't take long
  • Complete our Bee SAFE, Not Sorry puzzle to build incident reporting awareness. Submit your answer by May 31 for the chance to win a prize pack.

Send us a text

Learn more about Yale Cybersecurity Awareness at cybersecurity.yale.edu/awareness
Never miss an episode! Sign up to receive Bee Cyber Fit podcast alerts.

  continue reading

28 episod

Semua episod

×
 
Loading …

Selamat datang ke Player FM

Player FM mengimbas laman-laman web bagi podcast berkualiti tinggi untuk anda nikmati sekarang. Ia merupakan aplikasi podcast terbaik dan berfungsi untuk Android, iPhone, dan web. Daftar untuk melaraskan langganan merentasi peranti.

 

Panduan Rujukan Pantas

Podcast Teratas
Dengar rancangan ini semasa anda meneroka
Main