Join Ryan Spence for an in-depth discussion in this video Screen protectors, part of Learning Mobile Device Security.
- [Narrator] Hacking can take place outside…of a computer system.…Usually it is called social engineering…and it is a way to get unsuspecting people…to compromise their secure measures.…More often than not one of the easiest ways…to be a victim of a non-technical hack…is to have strangers witness what you type…on your phone's keyboard.…Prying eyes either beside or around you…have a privileged position when it comes to your passwords.…So one of the easiest security efforts…is to block prying eyes by using a screen protector…that blocks non-direct view of your screen.…
There are some good options available.…Zagg and 3M have privacy screen protectors.…Here's Zagg's privacy protector on their own website.…These privacy screens are an affordable…and simple way to set up your hardware security efforts.…Please protect yourself from those around you…and look for a good privacy screen protector.…
- Risks of mobile devices
- Disposing of mobile devices
- Securing an Android device
- Securing an iOS device
- Mobile device management on iOS and Android
- Securing mobile device hardware
Skill Level Beginner
Windows 10: Intune Device Managementwith Ryan Spence1h 39m Intermediate
Learning iPhone and iPad Securitywith Nick Brazzi1h 44m Beginner
1. Considering the Need for Security
2. Securing an Android Device
3. Securing an iOS Device
4. Security through Mobile Management
5. Securing Device Hardware
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.