Artwork

Konten disediakan oleh Wendy Battles/James Tucciarone. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Wendy Battles/James Tucciarone atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.
Player FM - Aplikasi Podcast
Offline dengan aplikasi Player FM !

5 Strategies to Protect Your Data if Your Mobile Device is Lost or Stolen

21:11
 
Bagikan
 

Manage episode 363492408 series 3395476
Konten disediakan oleh Wendy Battles/James Tucciarone. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Wendy Battles/James Tucciarone atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.

You use your phone to access all kinds of data. From viewing your bank balance to reading Yale emails to sharing information with family and friends.

So much of our life lives on our phones.
But is your data secure should it be lost or stolen?
The cost to replace it can be high. If the device contains High Risk Yale data, that data could be at risk. And imagine losing irreplaceable items that haven't been backed up like favorite vacation photos.
That's why it's so important to understand what we can do to minimize data loss. The good news? There are simple steps you can take to protect yourself.
In today's episode you'll learn:
▶️ Host Wendy's story of her lost device and what NOT to do
▶️ Surprising statistics about the cost of lost or stolen devices
▶️ Lost and stolen device "war stories"
▶️ 5 proactive steps you should take now, in the event your device is lost or stolen
▶️ Our buzzword of the day - encryption
And lots of other insights and information to protect the confidentiality, availability, and integrity of Yale data and systems (and your personal data too).
*********
Mentioned in this episode:
Why Reporting Suspicious Cyber Activity is Everyone's Responsibility: Insights from Yale's CISO Jeremy Rosenberg

Calls to Action:
Ready to build your cyber muscles, outsmart cybercriminals and hone your incident reporting skills?
Here are three simple actions you can take:

  • Review Yale's Report an Incident page about how to report suspicious behavior.
  • Set up password protection for your mobile device - it doesn't take long
  • Complete our Bee SAFE, Not Sorry puzzle to build incident reporting awareness. Submit your answer by May 31 for the chance to win a prize pack.

Send us a text

Learn more about Yale Cybersecurity Awareness at cybersecurity.yale.edu/awareness
Never miss an episode! Sign up to receive Bee Cyber Fit podcast alerts.

  continue reading

30 episode

Artwork
iconBagikan
 
Manage episode 363492408 series 3395476
Konten disediakan oleh Wendy Battles/James Tucciarone. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Wendy Battles/James Tucciarone atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.

You use your phone to access all kinds of data. From viewing your bank balance to reading Yale emails to sharing information with family and friends.

So much of our life lives on our phones.
But is your data secure should it be lost or stolen?
The cost to replace it can be high. If the device contains High Risk Yale data, that data could be at risk. And imagine losing irreplaceable items that haven't been backed up like favorite vacation photos.
That's why it's so important to understand what we can do to minimize data loss. The good news? There are simple steps you can take to protect yourself.
In today's episode you'll learn:
▶️ Host Wendy's story of her lost device and what NOT to do
▶️ Surprising statistics about the cost of lost or stolen devices
▶️ Lost and stolen device "war stories"
▶️ 5 proactive steps you should take now, in the event your device is lost or stolen
▶️ Our buzzword of the day - encryption
And lots of other insights and information to protect the confidentiality, availability, and integrity of Yale data and systems (and your personal data too).
*********
Mentioned in this episode:
Why Reporting Suspicious Cyber Activity is Everyone's Responsibility: Insights from Yale's CISO Jeremy Rosenberg

Calls to Action:
Ready to build your cyber muscles, outsmart cybercriminals and hone your incident reporting skills?
Here are three simple actions you can take:

  • Review Yale's Report an Incident page about how to report suspicious behavior.
  • Set up password protection for your mobile device - it doesn't take long
  • Complete our Bee SAFE, Not Sorry puzzle to build incident reporting awareness. Submit your answer by May 31 for the chance to win a prize pack.

Send us a text

Learn more about Yale Cybersecurity Awareness at cybersecurity.yale.edu/awareness
Never miss an episode! Sign up to receive Bee Cyber Fit podcast alerts.

  continue reading

30 episode

Alle episoder

×
 
Loading …

Selamat datang di Player FM!

Player FM memindai web untuk mencari podcast berkualitas tinggi untuk Anda nikmati saat ini. Ini adalah aplikasi podcast terbaik dan bekerja untuk Android, iPhone, dan web. Daftar untuk menyinkronkan langganan di seluruh perangkat.

 

Panduan Referensi Cepat

Dengarkan acara ini sambil menjelajah
Putar