top of page

Risk Mitigation Discussions: Tracker Tips & App Vetting

Listen to the podcast here or your favorite platform!

Host: Stacy Mandock 

Stacy Mandock provides support to the Risk Mitigation team as the program director. With the purpose of providing the safest possible experience for travelers both foreign and domestic, Stacy assists in doing the initial research for travel destinations and identifying potential concerns and/or risks before and during travel. Her specialty is working with collegiate travelers and ensuring that they’re thoroughly prepared before travel as well as tracking potential risks or threats throughout their trips.


Guest: Cliff Wilson


Cliff Wilson is Customer Success Account Manager and cybersecurity enthusiast at Microsoft and cybersecurity Subject Matter Expert with Army Special Operations. Over the past 10 years, Cliff's experience as an IT and cybersecurity expert has allowed him to hold positions with Microsoft and 5th Special Forces Group as a security expert. Cliff was one of the first people in the Special Operations community to utilize Cyber authorities for cyber related missions within the Army. Cliff spends the majority of his time supporting federal groups at Microsoft, but his passion for security motivates and drives him to helping customers and others be successful.


On this topic: Tracking apps and devices can really help us feel connected to friends and family across busy schedules and long distances. So what are some of the best practices we can utilize to keep us in touch and also keep our privacy in mind?

Another big convenience these days: apps. There’s one for just about everything, but not all of them have the best of intentions in the background. How do we mitigate those risks?

 In this podcast you will learn more about: 

  • Best practices for using tracking apps

  • How to stay connected safely and with only those you want to

  • How to check apps for any potential red flags before you download

  • What to for check after you download an app

Key takeaways:

  • Links referenced listed in the Resources sections below.

  • Applications can have a lot of access to your devices, which can be used for good or bad (over use of your data for monetization)





bottom of page