Information Security & Mobile Devices Awareness

Understand the dangers of using mobile devices, and learn practical ways to minimize the risk

Security Awareness

Our Client

What is Information Security and Mobile Device

Security risks haunt the use of mobile devices at work. As such devices can transport sensitive information in and out of the office network, criminals regularly use them as entry points into your organization. Mostly, it’s done by installing mobile malware over employees phones, or by breaching the thin security layer guarding your mobile phones and tablets.  

To protect the sensitive data over your office network, you need to treat your mobile devices just like any computer connected with your office network. Use antivirus software’s, firewalls, and practice email hygiene. Unfortunately, unlike office computers, mobile devices can move out of the secure office network, and in some cases, workers share them with family members as well.

Mobile Devices Such as laptops, tablets, and mobile phones are an integral part of how we communicate and do business.

Due to portability, ease and widespread use of such devices they create additional information security risks. You need to consider these risks when using mobile devices to access or share sensitive information.

First, you’ll learn about the information security principles that govern the use of mobile devices outside your workplace.

Then, we’ll introduce you to the risks of data breach when using mobile devices, and the basic measures that can reduce your exposure to such risks.

And lastly, we’ll talk about the possibility that your mobile device is stolen, lost or damaged.

Course Description

CategoryInformation Security
Course NameInformation Security and Mobile Devices
Duration30 mins
Certificate IncludedYes
Languages English
Course TypeInteractive online training
FormatLM-light, SCORM 1.2
Supported DevicesDesktop/Laptop, Tablet, Phone
Last UpdatedJune 30, 2021

What you’ll learn

  • What is a mobile device, and why they pose a security problem 
  • How mobile devices are typically used, and the security precautions you need to take when using them
  • Risks of loss or damage of a device, and what steps you should take to minimize those risks


  1. Information security and mobile devices
  2. Structure of this course
  3. Introduction to mobile security
  4. What devices are we worried about?
  5. Basic information security measures
  6. How serious is the problem?
  7. Potential impact of using mobile devices 
  8. Security issues during normal use
  9. The risk of mobile viruses
  10. Using your laptop outside the office
  11. Use firewalls to protect your data
  12. The risk of using wireless networks
  13. What is shoulder surfing?
  14. Mobile phone conversations
  15. Use password protection
  16. The risk of loss or damage
  17. The risk of theft of mobile phones
  18. Securing mobile devices
  19. Why to use encryption
  20. The risk of dropping your phones
  21. Carrying bags for laptops
  22. Don’t forget your USB drives
  23. The effect of environmental conditions
  24. Why do you need to take backups?
  25. What you should have learned

Who Should Attend?

  • IT security staff who need to expand their understanding of mobile threats
  • System and network administrators who need to allow mobile devices into their environment
  • Staff members that use laptops, mobile phones, tablets, and other mobile devices

Why emPower

100s of customers

  • 14+ Years of experience in working with small to large businesses from different industries
  • 95% customer retention

Customer Experience

  • 24x7 dedicated support and toll free number
  • 99%+ guaranteed uptime

Extremely Cost-effective

  • As low as $0.99/user/yr
  • We will match or better the price of your current LMS

Effective Courses

  • Each course is 20-40 min long to ensure engagement with quizzes and certificate
  • SCORM 1.2 Compliant


  • No setup costs
  • We deploy your customized solution in less than 48 hours

Our Achievements

Here you can review some statistics about our Education Center

Individual Users

Start Your Certification Course Today

Computer security is important for everyone who uses a computer or laptop at work. Similarly, if you use mobile phones, tablets, or other internet connected devices, you need to practice computer security. Such measures are important to protect your devices and the data stored over them.

The need for cyber security training varies with job roles. For most roles, cyber security awareness training would do. But, if you are a system administrator, or if you are in a cyber security role, you’d need specialized training. The training requirements vary with industry as well.

For those businesses and workers who depend largely on computers, securing your computers is a must. Firstly, criminals use web-based and physical tools to break into office computers. You cannot guard against such attacks without securing your computers. Secondly, federal and state laws require you to safeguard customer information stored on your computers.

Learning about information and computer security is a must for those who have been provided with a computer or a mobile phone to carry out their duties. Firstly, you need to learn how to protect your device and the data stored over it.  Secondly, if you connect with your office network, or use online tools, you need to know the best practices to safeguard your connection.