Module 3: Protecting Data Stored on Your Devices
Introduction
If you’re like most people, you probably store a lot of important information on your computer and mobile devices. So, what happens to your data if a threat actor gains access to your device? And what should you do when you decide it’s time to retire your old computer or phone?
In Modules 1 and 2, you learned some best practices to make it harder for threat actors to gain access to your devices in the first place. In Module 3, you will learn how to protect data stored on devices that you are currently using, as well as those that you plan to retire, to reduce the likelihood that a threat actor will be able to read, modify, or steal your data.
Topics
Module 3 will cover the following topics:
- Topic 3.0 – How to protect the data that is stored on your devices
- Topic 3.1 – Protecting data on old devices you don’t use anymore
Topic 3.0 How to Protect the Data that is Stored on Your Devices
Protect yourself against malware, back up data and encrypt devices to more securely protect the data stored on your devices.
Topic 3.1 Protecting Data on Old Devices You Don’t Use Anymore
Encrypt the devices you are currently using and securely store older devices.
Project Upskill Glossary
Learn more about the terms and concepts referenced in Project Upskill to help users improve their defense against common cybersecurity threats.