TAUGHT BY


Eric Schwartzman
Digital Marketing Consultant

Eric Schwartzman is a Digital Marketing Consultant with special expertise in digital media compliance. He also advises on digital audits, B2B content marketing, B2B SEO, B2B social media marketing, list building B2B email marketing, social media policy development, social media compliance, social media and web development. Schwartzman founded iPRSoftware and is the author of the best selling B2B digital marketing book “Social Marketing To The Business Customer,” the first book on business-to-business applications of social media with a special chapter on SEO For B2B and the Social Media Governance Template. Download a free copy of his vendor neutral 2020 Media Monitoring Buyers Guide.

Mobile Security Awareness Training for Social Media

Prevent an Embarrassing Data Breach with Mobile Security Awareness Training


Mobile Security Awareness Training Course covers safe social media use on mobile devices. Don’t let the convenience of mobile social networking lead to an embarrassing, costly data breach.

  • Mobile security awareness training on the risks of mobile social networking
  • Multi-factor authentication for Facebook, Twitter and Google
  • Mobile app security and location-based social networking risks
  • Accessing public wireless internet via laptop, iPhone or Android devices
  • Safely disposing of handheld other mobile data storage devices

Mobile App Misuse Results in 75% of Mobile Security Breaches
When it comes to cyber security, you are your own weakest link.  Even the best security software won’t protect your network, social networking profile, Facebook, Twitter or LinkedIn account from a mobile malware breach. Learn to properly adjust your app settings and deter social engineering scams.  Protect yourself with this essential mobile security awareness training.

Curriculum

  1. Overview

    2:45

  2. Introduction

    1:58

  3. Mobile App Security

    5:30

  4. Multi-factor Authentication

    3:46

  5. Dangers of Metadata

    5:13

  6. Location-Based Social Networks

    4:53

  7. Geolocation Tracking

    5:36

  8. Public Wi-Fi Risks

    2:17

  9. Hacked Chargers

    0:59

  10. Disposing of Devices

    4:24

  11. Wrap Up

    0:54

Total Runtime: 38:15