Artwork

Inhoud geleverd door Wendy Battles/James Tucciarone. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Wendy Battles/James Tucciarone of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.
Player FM - Podcast-app
Ga offline met de app Player FM !

5 Strategies to Protect Your Data if Your Mobile Device is Lost or Stolen

21:11
 
Delen
 

Manage episode 363492408 series 3395476
Inhoud geleverd door Wendy Battles/James Tucciarone. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Wendy Battles/James Tucciarone of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

You use your phone to access all kinds of data. From viewing your bank balance to reading Yale emails to sharing information with family and friends.

So much of our life lives on our phones.
But is your data secure should it be lost or stolen?
The cost to replace it can be high. If the device contains High Risk Yale data, that data could be at risk. And imagine losing irreplaceable items that haven't been backed up like favorite vacation photos.
That's why it's so important to understand what we can do to minimize data loss. The good news? There are simple steps you can take to protect yourself.
In today's episode you'll learn:
▶️ Host Wendy's story of her lost device and what NOT to do
▶️ Surprising statistics about the cost of lost or stolen devices
▶️ Lost and stolen device "war stories"
▶️ 5 proactive steps you should take now, in the event your device is lost or stolen
▶️ Our buzzword of the day - encryption
And lots of other insights and information to protect the confidentiality, availability, and integrity of Yale data and systems (and your personal data too).
*********
Mentioned in this episode:
Why Reporting Suspicious Cyber Activity is Everyone's Responsibility: Insights from Yale's CISO Jeremy Rosenberg

Calls to Action:
Ready to build your cyber muscles, outsmart cybercriminals and hone your incident reporting skills?
Here are three simple actions you can take:

  • Review Yale's Report an Incident page about how to report suspicious behavior.
  • Set up password protection for your mobile device - it doesn't take long
  • Complete our Bee SAFE, Not Sorry puzzle to build incident reporting awareness. Submit your answer by May 31 for the chance to win a prize pack.

Send us a text

Learn more about Yale Cybersecurity Awareness at cybersecurity.yale.edu/awareness
Never miss an episode! Sign up to receive Bee Cyber Fit podcast alerts.

  continue reading

30 afleveringen

Artwork
iconDelen
 
Manage episode 363492408 series 3395476
Inhoud geleverd door Wendy Battles/James Tucciarone. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Wendy Battles/James Tucciarone of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

You use your phone to access all kinds of data. From viewing your bank balance to reading Yale emails to sharing information with family and friends.

So much of our life lives on our phones.
But is your data secure should it be lost or stolen?
The cost to replace it can be high. If the device contains High Risk Yale data, that data could be at risk. And imagine losing irreplaceable items that haven't been backed up like favorite vacation photos.
That's why it's so important to understand what we can do to minimize data loss. The good news? There are simple steps you can take to protect yourself.
In today's episode you'll learn:
▶️ Host Wendy's story of her lost device and what NOT to do
▶️ Surprising statistics about the cost of lost or stolen devices
▶️ Lost and stolen device "war stories"
▶️ 5 proactive steps you should take now, in the event your device is lost or stolen
▶️ Our buzzword of the day - encryption
And lots of other insights and information to protect the confidentiality, availability, and integrity of Yale data and systems (and your personal data too).
*********
Mentioned in this episode:
Why Reporting Suspicious Cyber Activity is Everyone's Responsibility: Insights from Yale's CISO Jeremy Rosenberg

Calls to Action:
Ready to build your cyber muscles, outsmart cybercriminals and hone your incident reporting skills?
Here are three simple actions you can take:

  • Review Yale's Report an Incident page about how to report suspicious behavior.
  • Set up password protection for your mobile device - it doesn't take long
  • Complete our Bee SAFE, Not Sorry puzzle to build incident reporting awareness. Submit your answer by May 31 for the chance to win a prize pack.

Send us a text

Learn more about Yale Cybersecurity Awareness at cybersecurity.yale.edu/awareness
Never miss an episode! Sign up to receive Bee Cyber Fit podcast alerts.

  continue reading

30 afleveringen

Alle afleveringen

×
 
Loading …

Welkom op Player FM!

Player FM scant het web op podcasts van hoge kwaliteit waarvan u nu kunt genieten. Het is de beste podcast-app en werkt op Android, iPhone en internet. Aanmelden om abonnementen op verschillende apparaten te synchroniseren.

 

Korte handleiding

Luister naar deze show terwijl je op verkenning gaat
Spelen