Key Learning Points:

  • How to set up and use mobile devices securely
  • What credentials are important for securing mobile devices
  • How to configure networks on mobile devices
  • Why is it important to install app updates
  • How to respond when a mobile device is compromised
Securing Mobile Devices
Securing Mobile Devices
Securing Mobile Devices
Securing Mobile Devices
Securing Mobile Devices
CPD Points

Course Overview

An engaging online training course on Securing Mobile Devices, designed to raise awareness on using mobile devices at work and protecting business information. In this interactive microlearning course, learners will understand how to prevent breaches in information security associated with mobile devices.

Presented in a gamified format, learners are presented with a scenario at work where they have received a new work tablet. Learn the best practice to follow while setting up a new mobile device and keeping information secure.

By raising awareness, learners can confidently make the right decisions and understand the significance of keeping mobile devices secure, reducing the risks of information breaches.

* AVAILABLE OCTOBER 2020 *

Course Details

  • Course duration: 5 minutes
  • Engaging, gamified format
  • Final assessment to pass the course
  • Certificate on completion
  • Course can be tailored using Adapt Authoring Tool
Download PDF

Who Should Take This Course?

This microlearning course on information security offers general awareness and is suitable for employees at all levels within the organisation including:

  • Full-time employees
  • Part-time employees
  • Administrators
  • Coordinators
  • Managers
  • Supervisors
  • Directors

The Assessment

Learners must use their knowledge and understanding of information security to keep their mobile devices secure. Learn how to make the right decisions to correctly set up a new work tablet and ensure that your new device is secure. Learners should aim to take as many correct decisions as possible to keep the risks low in the security meter. Learners can also take the assessment again to improve their score.

2 Ways of Purchasing

You can purchase our courses individually or for even better value you can purchase the complete range of Compliance, Health and Safety or Performance Management courses in one neat bundle.

1. Individual Licenses

If you buy courses on an individual bases you pay a price per learner, per course per year. You can run these courses on your own LMS if Xapi/SCORM compliant or you can take them.

See Prices
Recommended

2. Complete Bundle

Buy all of the Compliance, Health and Safety or Performance Management courses in one great value package and receive unlimited benefits.

See Prices

1. Individual Pricing

Number of Learners Cost (per year)
1 - 10 29 / per learner
11 - 20 25 / per learner
21 - 50 20 / per learner
51 - 100 15 / per learner
101 - 150 10 / per learner
150+ POA

Exchange rates are updated regularly but are only intended as a guide.

2. Complete Bundle Pricing

If you buy all the Compliance, Health & Safety or Performance Management in a complete bundle, all features come as standard, no matter the size of your organisation!

Number of Learners Cost (per year)
1 - 100 30 / per learner
101 - 200 25 / per learner
201 - 300 21 / per learner
301 - 400 18 / per learner
401 - 500 15 / per learner
501 - 750 12.50 / per learner
751 - 1000 10 / per learner
1001 - 2500 8 / per learner
2501 - 5000 6 / per learner
5000 - 10,000 5 / per learner
10,000 + POA
Included Features
  • All courses in our catalogue
  • New courses added regularly
  • Branded, downloadable posters
  • Customise Course Content for Your Team
  • Astute eLearning Platform
  • Regular course updates
  • Dedicated Account Manager
  • Unlimited help desk support

Exchange rates are updated regularly but are only intended as a guide. Prices are based on a 2 year contract.

Get a Quote

The Importance of Information and Cyber Security Training:

Advances in technology have meant that more and more mobile devices are in use for business. Mobile devices, however, are accompanied by their own set of risks. Mobile devices compromised due to loss, theft or damage can result in major threats to information security for organisations. Training your employees on how to use mobile devices securely is vital for preventing risks to information security and keeping business information secure.

The Importance of Information and Cyber Security Training:

FAQ's

If you have any questions that are not covered here, please get in touch.

Get in Touch
How to secure mobile devices?
To secure mobile devices, users must set a lock screen and ensure the screen to lock automatically after a period of time. Using a PIN, strong password and biometric login to unlock the device is also recommended. Passwords and PIN must be hard to guess and should be periodically updated in line with organisational IT security policy.
Why is network security important on mobile devices?
Ensuring that you use your organisation’s secure network or your home secure network to access the internet or VPN on a mobile device is vital for preventing unauthorised access and information breaches. Never connect to an unsecured or public WIFI network or use a physical (ethernet) connection to an unsecured network.
How to mitigate the risks for compromised mobile devices?
Care must be taken when transporting mobile devices out of the office as they may be lost or stolen. Mobile devices should be kept on you whilst travelling and extra care should be taken when using them to mitigate the risk of theft. If sensitive information is stored on mobile devices, make sure it is encrypted. If any work devices are lost or stolen, report it to your IT department immediately.

7 Day Instant FREE Trial

Try a Demo