BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20200804T160000Z
DTEND:20200804T170000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Mobile Phishing and Vulnerability – The Facts and the Myths
DESCRIPTION:Part of the Business Security Technology in the New Normal.\n\nBusiness Continuity Planning\, Disaster Recovery and Holistic Security Series: practices practical for protecting your business\, presented by Cyreonix.\n\n\n\nMobile phishing incidents occur twice as frequently as physical lost or stolen device incidents. This is because phishing is both different and more problematic on mobile devices\, especially in a post-perimeter and work remote world.\n\n\n\nWhen you add mobile into your business equation\, phishing extends beyond corporate email into SMS and MMS\; messaging apps such as WhatsApp\, Facebook (messenger)\, and personal email.
X-ALT-DESC;FMTTYPE=text/html:<em>Part of the Business Security Technology in the New Normal.</em><br />\nBusiness Continuity Planning\, Disaster Recovery and Holistic Security Series: practices practical for protecting your business\, presented by Cyreonix.<br />\n<br />\nMobile phishing incidents occur twice as frequently as physical lost or stolen device incidents. This is because phishing is both different and more problematic on mobile devices\, especially in a post-perimeter and work remote world.<br />\n<br />\nWhen you add mobile into your business equation\, phishing extends beyond corporate email into SMS and MMS\; messaging apps such as WhatsApp\, Facebook (messenger)\, and personal email.
LOCATION:Online webinar
UID:e.1159.5467
SEQUENCE:3
DTSTAMP:20260405T153846Z
URL:http://members.durhamchamber.org/events/details/mobile-phishing-and-vulnerability-the-facts-and-the-myths-5467
END:VEVENT

END:VCALENDAR
