cybesecurity: guidelines for diplomats
DESCRIPTION
Diplomats use computers in their offices and at home, and smartphones and tablets that support voice and data, and can run hundreds of applications. Unless due care is taken to protect such devices, the owners are a target of attacks and crime. None of the suggestions in this presentation are obligatory – just proven good practice.TRANSCRIPT
Con
cept
: Ste
fano
Bal
di, E
d G
elbs
tein
Con
cept
: Ste
fano
Bal
di, E
d G
elbs
tein
Con
cept
: Ste
fano
Bal
di, E
d G
elbs
tein
Con
cept
: Ste
fano
Bal
di, E
d G
elbs
tein
Con
cept
: Ste
fano
Bal
di, E
d G
elbs
tein
Con
cept
: Ste
fano
Bal
di, E
d G
elbs
tein
Con
cept
: Ste
fano
Bal
di, E
d G
elbs
tein
Con
cept
: Ste
fano
Bal
di, E
d G
elbs
tein
Con
cept
: Ste
fano
Bal
di, E
d G
elbs
tein
Con
cept
: Ste
fano
Bal
di, E
d G
elbs
tein
Con
cept
: Ste
fano
Bal
di, E
d G
elbs
tein
Con
cept
: Ste
fano
Bal
di, E
d G
elbs
tein