Computer Security Tip of the Week
Scott Aurnou – If your mobile device is lost, stolen, or even ‘borrowed,’ anyone holding your smartphone or tablet can do whatever they want with it – including impersonating you and accessing your contacts and other files – unless you take this one simple step…
If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).