content
Outline/Content
- Major flaws: password management,information security management, physical threats
- Spam, phishing and human flaws
- Social engineering
- Mobile device management and teleworking
- Data cycle with social network
- Internet of things
- good practices