Crash Course in Cyber Security

  1. Share
0 0

Any device capable of being connected to cyberspace can be subject to surveillance, hacked, and used monitor behavior in the physical world. The lowest level of threat is probably the thief who wants to steal your smart phone. The highest level of threat is the nation state monitoring you using that same smart phone, supposing you will compromise the local believers. Between these extremes are the criminals who call your contact list, tell them you have been kidnapped and demand ransom, and the criminals who seize your data with ransomware. Mission teams may need to turn to cybersecurity professionals to develop plans for working in closed countries and nations that are fundamentally hostile to the faith or are just corrupt. Knowing when this help is needed is critical to staying safe. This session will provide participants with tools and strategies to enhance their cybersecurity.

Comments

To leave a comment, login or sign up.