The Need for BYOD Mobile Device Security Awareness and Training

Size: px
Start display at page:

Download "The Need for BYOD Mobile Device Security Awareness and Training"

Transcription

1 The Need for Awareness and Training Completed Research Paper Mark A. Harris University of South Carolina Karen Patten University of South Carolina Elizabeth Regan University of South Carolina ABSTRACT In 2013, people will purchase 1.2 billion mobile devices, surpassing PC s as the most common method for accessing the Internet. The leading two mobile device platforms, Android and ios, both have security concerns surrounding their operating systems and application markets. The popularity of Bring Your Own (BYOD), where employees use their own devices for both personal and work situations, potentially brings insecure devices into the organization. While most IT professionals agree mobile devices pose major security risks, there is a major lack of mobile device security awareness and training programs in organizations. This paper reports the results of a survey of 131 college students entering the workforce, which demonstrates a lack of security awareness and the need for mobile device security awareness and training in organizations. This paper also reviews the major security concerns with mobile devices and makes some general security recommendations. Keywords Mobile device security, BYOD, security awareness and training, Android, ios INTRODUCTION Mobile devices, including smartphones and tablets, have rapidly developed in the last 5 years to the point where they can no longer be ignored by organizations. In 2013, people will purchase 1.2 billion mobile devices, surpassing PC s as the most common method for accessing the Internet (Lookout, 2013). Bring Your Own (BYOD), where people use their own mobile devices for both personal and work related tasks, is also rapidly increasing. The SANS Institute recently reported 61 percent of respondent s organizations allowed BYOD access to resources (SANS, 2012). IT professionals dealing with the new influx of devices on their networks need to properly manage mobile device security. For many organizations today, the BYOD issue is less a matter of No, we can t do it and more a question of how do we do it? (Thomson, 2012). Managing mobile device security is no simple task and is not being handled adequately in many organizations. A recent study of IT security professionals revealed 68% of them have no way of identifying known mobile device vulnerabilities on their networks (Tenable-Security, 2012). Most of the survey respondents reported that mobile devices are a security threat to their business, however 67% reported that their companies either have no policies or controls for mobile device usage on their network or that employees ignored the existing mobile device usage policies (Tenable-Security, 2012). As of January 2013 in the United States, Android made up 52.69% of mobile device operating systems and Apple ios accounted for 34.9% (Statcounter, 2013). Although these platforms have their technical differences, they both can potentially have serious security concerns with malware, application markets, privacy, and data protection. One of the biggest threats to organizations are users who jailbreak or root their BYOD devices. Jailbreaking and rooting

2 removes many of the security restrictions originally protecting the device, allowing users more freedom when using their device, but also potentially allowing malware more access. This paper explains why organizations need mobile device security awareness and training for most employees, which involves awareness of the security problem and training to create competent security skills. To demonstrate the need, a survey of current college student s personal mobile device security is discussed. These students are about to enter the workforce, so how they secure their mobile devices is of interest to employers. The next section, mobile device insecurity, reviews the security concerns with mobile devices. The following sections discuss basic personal security recommendations and security awareness and training. The student mobile device survey and results are then discussed, followed by the paper s conclusion. MOBILE DEVICE INSECURITY This section identifies the basic security concerns with the two most popular operating systems, Google s Android and Apple s ios mobile device platforms. Also discussed are security concerns with malware, jailbreaking, rooting, and Wi-Fi. Mobile Platforms In the United States, Google s Android took the lead over Apple s ios as the most popular mobile device platform in mid-2011 (Statcounter, 2013). All other platforms, like Windows Mobile, Symbian, and BlackBerry, account for less than 2% each of the U.S. market (Statcounter, 2013). Since Android and Apple account for more than 85% of the market and Android is rapidly growing, this paper discusses only those two platforms. Because Android is an open source platform where developers can modify the software, developers can create cutting-edge applications (apps). Developers can also get applications to market quickly because of Android s available developer tools and quick vetting process. A vetting process should at least include checking the background of the developer and thoroughly inspecting the application for appropriateness, proper software development, and malicious code. However, a problem with the Google Play market is a lax vetting process (Greenberg, 2012). Google has recently attempted to better vet software developers that are known to develop malware, but the vetting process falls far short of Apple s (Greenberg, 2012). The vetting process on 3 rd party markets, where Google and Apple have little control, can be much worse. Examples are rogue markets that contain most of the malware (Arxan, 2012). However, not all Android 3 rd party markets are the same nor do they all vet developers and applications in the same manner as the Google Play market. Some are actually more stringent. For example, Amazon s Appstore for Android and Verizon s V-CAST have a more stringent vetting process than Google Play (Strohmeyer, 2011). Download sites like these use a similar vetting model to Apple s App Store model (Lookout, 2011). Android users have the availability of multiple markets with very different levels of security, which can be a major security risk without proper awareness and training. Google has also recently attempted to address malware problems with the Google Play market by scanning new applications for known malware and testing new applications in a simulated environment (Greenberg, 2012). To catch malware downloaded from 3 rd party markets, Google added malware scanning to the latest version of Android, Jelly Bean 4.2. However, the scanner does not check for modifications to the code after the initial installation, such as can occur when an app is updated. This is a problem where apps execute new code after installation, which bypasses the application screening process (Greenberg, 2012). Another problem with the Android platform is the availability of multiple carriers and vendors that do not follow a particular standard, leading to old versions of the OS still on the market (Mansfield-Devine, 2012a). As of January 2013, Jelly Bean 4.2 was the latest version of Android. However, only 1.2% of the devices on the market had this version (Platform-Versions, 2013). This means that very few Android users have the built-in app scanning feature just discussed. The previous version of Jelly Bean, 4.1, only accounted for 9% of the market. The two most popular versions on the market are Ice Cream Sandwich (29.1%) and Gingerbread (47.6%). Ice Cream Sandwich includes version numbers 4.03 and 4.04 and was publicly released in October Gingerbread includes version numbers 2.3 to and to and was released in December 2010.

3 Adding to the problem of malware vulnerability in the Android platform are the very low number of users who update their operating systems (OS) when software patches are available. Research suggests that it takes 8-10 months for half of the Android users to update their software, plus they were more likely buy a new device than update their old device s software (Mansfield-Devine, 2012a). Patches are still usually available for older operating systems, but users must install the patches to receive the security update. Unlike Android, Apple ios is a closed operating system controlled by Apple. Only one manufacturer makes devices for the platform and there is no fragmentation of the operating system (Mansfield-Devine, 2012b). Apple claimed that over 80% of iphone and ipad users had the latest ios as of June 2012 (Mansfield-Devine, 2012a). From a security point of view, this is much better than Android s 1.2% having the latest version. Adding to the security of ios is Apple s App Store market, which is controlled by Apple with a strong vetting process for developers and apps. Users must jailbreak their devices in order to access 3 rd party markets outside of the Apple App Store, which is not permitted by Apple. Jailbreaking voids the warranty on Apple devices (Kingsley- Hughes, 2013). Jailbreaking will also be discussed in more detail later. If users only use the Apple App Store for apps, they will experience reasonably secure apps. Apple also has an advantage over Android when it comes to updating the OS and patching software. The latest versions of ios can update using itunes or Over The Air (OTA) (Mansfield-Devine, 2012a). OTA allows the user to update directly to the device without having to connect to a PC. Updating through itunes and OTA are both easy and encouraged by Apple, thus part of the reason Apple devices operating systems are more current than Android devices, which means better security. Overall, the strategic plan of Google and Apple in regard to their OS platforms is the reason for the security differences. Apple is more secure because of the control they place on their devices. But, many users feel that this control is like big brother telling them what to do. Many ios users want to rebel by jailbreaking their devices, thus removing restrictions. Contrary to Apple is Google, which lets Android users have a lot of freedom in deciding how to use their devices. With freedom comes risk, thus the reason for the malware problem. This is the same risk Apple users take when they jailbreak their devices. The next section discusses malware followed by a section on jailbreaking and rooting devices. Malware Forecasts predict that mobile device users will download 70 billion apps in 2014 (Lookout, 2013). While malware can be found in both Apple ios markets and Android markets, Android malware is growing and spreading much more rapidly. Android now exceeds PCs for malware attacks in the United States (Mansfield-Devine, 2013) and over 99% of all malware detected in 2012 was written for Android (Kaspersky, 2013). Trend Micro saw an increase of 350% of Android malware in 2012 over 2011 for a total of 350,000 new samples (Trend-Micro, 2012). It took the PC over 14 years to reach the same total of malware samples, while Android did it in just three (Trend-Micro, 2012). SMS premium text messaging is currently the biggest problem for mobile device malware (ESET, 2013; Trend- Micro, 2012). Malware of this type can send text messages in the background without the user s knowledge. Just over 78% of Lookout s 2012 malware detections fall into this category and cost the average user $9.99 a month (Lookout, 2012). These apps often disguise themselves as popular apps to trick the user into downloading and installing them, with two notable examples including Angry Birds Space and Instagram (Trend-Micro, 2012). Another problem affecting both platforms is fake applications. Fake malware applications look and work like the real thing to entice the user to download and install them, but they often also contain malicious code. Security firm Arxan reported that all of the top 100 apps for Android and 92 of the top 100 apps for ios have fake malware versions available as of mid-2012 (Arxan, 2012). Most fake malware applications are found on 3 rd party application sites, which are easy for Android users to access and more difficult for ios users to access. Since Android users are not confined to just the Google Play market, they can instead easily install from 3 rd party markets, where much of the malware resides (Arxan, 2012). For Apple ios devices, the user needs to jailbreak the device, which is discussed in the next sub-section.

4 Jailbreaking and Rooting Jailbreaking is a term mostly used with Apple devices. Jailbreaking a device is a process that removes the platform s restrictions, allowing users to install any applications from any market, install a modified operating system, and have administrative user permissions. Rooting is often referred to as a similar action performed on Android devices. Rooting a device is typically done to give the user administrative privileges, which allows them to overcome limitations placed on the device by carriers and device manufactures. Apple users that jailbreak their devices usually do so to get access to 3 rd party applications and to customize their devices. Android users that root their devices often do so to remove vendor-installed software and upgrade operating systems. Both jailbreaking and rooting are risky because the software needed to perform the operation is not available from Apple or Google, thus difficult to verify and trust. Also, if the jailbreak or rooting operation is successful and malware free, the devices are then vulnerable to app malware, especially from 3 rd party markets, because security restrictions were removed. There is a large percentage of Apple ios devices that are jailbroken because there are many people that like Apple products, but do not like being limited (Mansfield-Devine, 2012b). In addition, the problem may be getting worse. The new version of Apple ios 6.1 released in January 2013 had 7 million jailbreak downloads in the first 4 days on the market, which is more jailbreak downloads than ever before (Greenberg, 2013). Because jailbroken and rooted devices have a much higher risk of malware, the security concerns for organizations are understandably high. Jailbroken and rooted devices pose tremendous threats to any organization. Many IT security professionals have called for a ban of all jailbroken and rooted devices on corporate networks (ZDNet, 2013). Users need to be made aware of these risks through an awareness and training program. Wi-Fi Connectivity to corporate networks and the Internet typically occur either through a mobile broadband network (3G/4G) or a Wi-Fi network. As of 2012, 71% of ios users and 32% of Android users in the U.S. used both mobile and Wi-Fi networks to access the Internet (Comscore, 2012). This implies that, as with laptop connectivity to corporate networks and the Internet, smartphone and tablet users also need to be aware of Wi-Fi security protocols and risks associated with using Wi-Fi. Older Wi-Fi protection, Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA2), were easily cracked and considered insecure (Bradbury, 2011; Gold, 2011). WPA2, the current standard for protecting Wi-Fi, seemed uncrackable until recently (Gold, 2011). In 2010, Elcomsoft s Wireless Security Auditor (WSA) was released and could crack WPA2 passphrases. The company s WSA software has the ability to brute force crack as many as 103,000 WPA2 passwords per second and can also crack the older WPA (Gold, 2011). Security experts now recommend the use of 20+ character WPA2 passphrases with upper and lower case characters along with the costly implementation of a Radius-based virtual private network (VPN) system (Gold, 2011). For personal use, personal virtual private network (VPN) software can be purchased. A personal VPN creates an encrypted tunnel over unsecure networks, protecting the data within the tunnel. Larger organizations often host their own VPN servers that employees connect to from any Internet connection. But, for individual use, personal VPN servers are hosted by 3 rd party vendors. There are many vendors of personal VPNs and the software is available for all of the popular operating systems, including smartphones and tablets. BASIC SECURITY RECOMMENDATIONS At a minimum, everyone owning a mobile device should consider the basic security recommendations listed below. Companies allowing mobile devices on their networks would also be safer if all employees followed these basic recommendations. 1. Use encryption to protect data on the device (FBI, 2012; NIST, 2012); 2. Review and understand application permissions (FBI, 2012; InfoSec, 2013); 3. Passcode or password protect the device (InfoSec, 2013; NIST, 2012); 4. Install antivirus protection (FBI, 2012; US-CERT, 2011a); 5. Install firewall protection (InfoSec, 2013); 6. Do not jailbreak or root the device (FBI, 2012; US-CERT, 2011a);

5 7. Avoid unknown wireless networks (FBI, 2012; InfoSec, 2013); 8. Use VPNs over Wi-Fi (NIST, 2012); 9. When using configurable Wi-Fi, use 20+ character passphrases with WPA2 (Gold, 2011); 10. Perform timely software updates (FBI, 2012); 11. Do not install illegal or unauthorized software (InfoSec, 2013); 12. Do not install software from untrustworthy markets (Mylonas, Kastania, & Gritzalis, 2012); 13. Back-up data (US-CERT, 2011b); 14. Avoid clicking on unknown links (FBI, 2012; Homeland-Security, 2013); 15. Setup remote data wipe if the device is lost or stolen (InfoSec, 2013); and 16. Avoid storing usernames and passwords on the device or in the browser (Coninsync, 2013). SECURITY AWARENESS AND TRAINING Learning evolves through three distinct levels: awareness, training, and education (Katsikas, 2000). Awareness is the lowest level and should not be considered a form of training. Awareness activities help individuals to become aware that there are concerns for information systems security and that they should respond accordingly (Katsikas, 2000). Katsikas (2000) defines training as going beyond awareness to building knowledge and producing competent security skills. Training takes longer than awareness and requires learners to take a more active role in the process (Katsikas, 2000). Beyond training is education, where expertise is developed for professionals working within the security discipline. Security professionals in charge of protecting information systems from mobile device threats need this top level of learning education. Security awareness and training for most employees would involve the first two levels, awareness of the security problem and training to create competent security skills. Users of mobile devices need to be aware of threats and precautions that should be taken and need to have competent skills to secure their devices. Knowing that antivirus, firewalls, and data wipe software should be installed on mobile devices is different from understanding how to install and configure them. Knowing what VPNs are and that they should be used with mobile devices over Wi-Fi is different from training someone to install and configure VPNs on mobile devices. Mobile device security awareness should be added to the broader security awareness program. Many companies do not have a security awareness program to begin with, which is a major problem (CSI, 2011). Those that do not need to create a security policy and include a mobile device component. To demonstrate the need for mobile device security awareness and training, the next sections discuss results from a survey of college students about to enter the workforce about how well they secure their mobile devices. SURVEY A survey of 131 college students was conducted in 2012 to see how well they secure their personal mobile devices based on some of the expert security recommendations listed above. This information is important for organizations because these students already have or are about to enter the workforce with their mobile devices. The 131 students that completed the survey came from three universities, two in the northeast United States and one in the southeast. Male students represented 66% of the respondents and females represented 34%. Information technology students made up 52% and non-it students accounted for the other 48%. RESULTS AND DISCUSSION The participants were asked if they owned a smartphone, tablet, or laptop/pc. Based on their response, they were asked a series of security questions specific to the devices they owned. For space reasons, only a few key results are discussed in this paper. Table 1 describes the devices owned by the participants. As expected, most students owned a laptop or PC and many owned smartphones.

6 All Smartphone 81% Tablet 24% Laptop/PC 98% Table 1. Ownership Table 2 summarizes the operating system on their devices. In this survey, Apple ios held a slight edge over Google s Android with smartphones. However, there were many more ios tablets than Android tablets. It is clear Apple still has tablet dominance, as they once did with smartphones. Microsoft Windows dominated the laptop\pc devices. Operating System All Smartphone Tablet Laptop/PC ios 46% Android 44% ios 77% Android 19% Windows 82% Other 18% Table 2. Operating Systems When asked to rate their expertise in securing their equipment on a 7-item Likert scale, IT students considered themselves better at securing all devices than did non-it students, which is logical considering the nature of the IT discipline. Table 3 is a summary of student s self-reported ratings at securing their devices. As expected, all students were more comfortable with securing PCs than mobile devices. IT Non-IT Smartphone Tablet Laptop/PC Table 3. Expertise in Securing s While IT students were more comfortable with security than were non-it students, the data demonstrates both groups failed to adequately protect their devices. Table 4 summarizes the use of security safeguards. While IT students installed antivirus more than non-it students on smartphones, the opposite is true for tablets. Antivirus is not available for ios, so the numbers were adjusted to Android devices only. Overall, both groups failed to

7 adequately install antivirus, which should be alarming to organizations allowing access of these devices to corporate networks. Antivirus software is the first app that should be installed on a mobile device and there are many free versions available. Firewall installation was even lower than antivirus installation. Many software firewall products are available for free along with antivirus in a security suite. Again, firewall software is not available for ios. Safeguard IT Non-IT Smartphone Tablet Antivirus* 42% 22% Firewall* 33% 12% Authentication 69% 62% Software Updates 80% 80% Antivirus* 21% 24% Firewall* 14% 19% Authentication 64% 35% Software Updates 79% 65% * Responses relate to Android users only Table 4: Use of security safeguards Authentication credentials are considered passwords, phrases, patterns, or other mechanisms needed to access a device. The use of authentication is important to prevent unauthorized physical access to a device, especially if the device is lost or stolen. Authentication utilization, while much better than antivirus and firewall installation, is still considered poor among the groups. IT students performed only slightly better than non-it students on smartphones, but considerably better on tablets. Software updates patch vulnerabilities within operating systems and applications. It is essential to update software and applications quickly to avoid known threats. Both groups did a fair job of updating smartphone software, with 80% of both groups quickly updating when prompted. For tablets, the percentages were similar for IT students and considerably lower for non-it students. The next set of questions determined the student s risky behaviors, as summarized in Table 5. Installing software from 3 rd party markets is especially risky. Most malware and fake applications are found on 3 rd party markets. While non-it students are more risky than IT students when visiting 3 rd party markets for smartphone applications, one in five overall students downloaded 3 rd party market apps. The percentages for tablets are similar. Those visiting 3 rd party markets should take precautions to maximize protection by fully utilizing antivirus and firewall applications, as well as the other basic security precautions. Jailbroken and rooted devices are considered one of the top security threats to mobile devices. Overall, one in five students reported jailbreaking or rooting their devices, thus creating major security risks for organizations that accept these devices on their networks. Between groups, IT students are more than twice as likely to jailbreak or root a smartphone than non-it students. For tablets, IT students were nearly twice as likely to jailbreak or root.

8 Safeguard IT Non-IT Smartphone Tablet Installing software from 3 rd party app markets Jailbreaking or rooting of mobile devices Allowing mobile apps to store authentication credentials Installing software from 3 rd party app markets Jailbreaking or rooting of mobile devices Allowing mobile apps to store authentication credentials 18% 22% 34% 16% 37% 37% 21% 24% 21% 12% 43% 53% Table 5: Potentially Risky Behaviors Allowing browsers and applications to store credentials on mobile devices is also risky. Doing so may allow others in possession of the device access to accounts. It may also allow malware to access the user s accounts. Both groups were equal (37%) in allowing smartphone browsers and applications to store credentials. On tablets, about half of all students allowed credentials to be stored. If a device is lost or stolen, data wipe software can be utilized to clear sensitive data from the device. IT students utilized data wipe on smartphones much more than did non-it students, as shown in Table 6. However, both groups poorly utilize the software and should install one of the many free versions available. For tablets, the percentages were a little better, but still poor overall. IT Non-IT Smartphone 56% 20% Tablet 57% 40% Table 6: Use of Data Wipe Software Because Wi-Fi access has major security concerns, VPNs should be utilized over all Wi-Fi connections. Personal VPNs are inexpensive and many are free to students through their universities. VPNs are especially important in public places where vulnerability is higher and on corporate networks were sensitive corporate data needs protection. Nearly 80% of students used Wi-Fi in public places on their smartphones and many use Wi-Fi at work, as seen in Table 7. The percentages were similar for tablet use of Wi-Fi in public places, with non-it students using public Wi-Fi a little more. However, fewer IT students use Wi-Fi at work with tablets and considerably more non- IT students use Wi-Fi at work with tablets. The use of VPNs over these Wi-Fi connections is alarmingly low, with more using VPNs with tablets than with smartphones. One explanation for more tablet VPN usage is that the tablets may be corporate issued and secured. Regardless, VPN usage is poor for both groups.

9 Safeguard IT Non-IT Smartphone Tablet Use Wi-Fi on public networks 77% 79% Use Wi-Fi at work 64% 39% Utilized VPNs 16% 16% Use Wi-Fi on public networks 71% 82% Use Wi-Fi at work 56% 75% Utilized VPNs 29% 29% Table 7: Use of Wi-Fi In other interesting results, one in four IT students (26%) and just over one in five non-it students (22%) had their smartphone lost or stolen. Lost or stolen devices can be vulnerable if passcodes and data wipe software are not utilized. Of those that lost or had their smartphones stolen, one in four did not have a passcode to prevent access to the device. Only half of them had software installed to wipe personal data. Even more interesting is the result that only 27% of those who jailbroke or rooted their devices had antivirus installed. Jailbreaking or rooting a device removes security and makes the device even more vulnerable to malware, thus antivirus is even more critical. In addition, only 33% of those that installed apps from 3 rd party markets had antivirus installed. Third party markets are the primary source of malware and fake applications. At the time of this survey, 87% of IT students and 69% of non-it students used their smartphones for work purposes. This should be alarming to organizations since many of the devices these students are using are inadequately secured, as demonstrated by the survey results. Regarding security, 76% believe it is the employer s responsibility to provide security software for BYOD equipment. Overall, surveyed students poorly secured their mobile devices. Between groups, IT students were no better at securing their devices than non-it students and may actually be considered more risky because they are twice as likely to jailbreak or root a device. Organizations need to anticipate these university students entering their workforce and take the necessary precautions to secure these devices. This paper suggests organizations start with mobile device security awareness and training. One can only speculate as to why students do not install antivirus or firewall software or why they jailbreak or root their devices. Since much of the expert suggested protection is free, the reason should not be financial. This paper postulates the reason is lack of awareness and training. A mobile device security awareness and training program will teach users the danger of mobile device malware and teach them how to best protect their devices. Because these devices are connecting to corporate networks, organizations need to consider them a part of their network. Security awareness and training needs to cover mobile devices just as it covers PCs and other security threats to the organization. CONCLUSION This paper discusses threats from mobile devices, including smartphones and tablets. Mobile devices now outnumber PCs for Internet access. Accordingly, malware attacking these devices now outnumbers PC malware as well. The popularity of mobile devices has grown so rapidly that many people do not understand how to properly secure such devices, evident from surveyed university students. Part of the solution is for organizations to create mobile device security awareness and training and give it to all new and current employees on a minimum annual basis. Such training would make users aware of antivirus, firewall, and data wipe software, all available for free or inexpensively. Users would also be made aware of malware and 3 rd party markets. They would understand the implications of jailbreaking or rooting their devices and how their actions affect their personal data as well as company data. While mobile device security awareness and training is only one part of maximizing information security, it has become an essential part that cannot be ignored.

10 REFERENCES 1. Arxan. (2012) State of Security in the App Economy: Mobile Apps Under Attack. Retrieved 02/09/2013, from 2. Bradbury, D. (2011) Hacking wifi the easy way, Network Security, 2, 9-12, doi: /s (11) Comscore. (2012) iphones Have Significantly Higher Rates of Wi-Fi Utilization than Android Phones in the U.S. and U.K. Retrieved 02/17/2013, from Wi-Fi_Utilization. 4. Coninsync. (2013) Why You Should Avoid Saving Passwords on Your Smartphone? Retrieved 02/17/2013, from 5. CSI. (2011) 2010/2011Computer Crime and Security Survey. Retrieved , from 6. ESET. (2013) Trends for Retrieved 03/07/2013, from 7. FBI. (2012) Smartphone Users Should be Aware of Malware Targeting Mobile s and the Safety Measures to Help Avoid Compromise. Retrieved 02/11/13, from 8. Gold, S. (2011) Cracking wireless networks, Network Security, 11, 14-18, doi: /s (11) Greenberg, A. (2012) Google gets serious about android ssecurity, Now auto-scans app market for malware, Forbes, February 2, Retrieved 02/11/13, from Greenberg, A. (2013) Evasi0n is the most popular jailbreak ever: Nearly seven million ios devices hacked in four days, Forbes, February 8, Retrieved 02/12/13, from Homeland-Security. (2013) Cybersecurity Tips. Retrieved 05/02/2013, from InfoSec. (2013) Protecting Mobile s. Retrieved 02/17/2013, from Kaspersky. (2013) Find and Call: Leak and Spam. Retrieved 02/11/13, from Katsikas, S. K. (2000) Health care management and information systems security: awareness, training or education? International Journal of Medical Informatics, 60, Kingsley-Hughes, A. (2012) 'Should I jailbreak my iphone?' And other jailbreaking questions answered, Forbes, May 28, Retrieved 02/17/2013, from Lookout. (2011) Lookout MobileThreatReport Retrieved , from Lookout. (2012) State of Mobile Security Retrieved 01/13/2013, from Lookout. (2013) Mobile Threat Predictions. Retrieved 02/11/13, from

11 19. Mansfield-Devine, S. (2012a) Android architecture: attacking the weak points, Network Security, 10, 5-12, doi: Mansfield-Devine, S. (2012b) Paranoid Android: just how insecure is the most popular mobile platform? Network Security, 9, 5-10, doi: Mansfield-Devine, S. (2013) Security review: the past year, Computer Fraud & Security, 1, 5-11, doi: Mylonas, A., Kastania, A., and Gritzalis, D. (2012) Delegate the smartphone user? Security awareness in smartphone platforms, Computers & Security, 0, doi: NIST. (2012) Guidelines for Managing and Securing Mobile s in the Enterprise (Draft). Retrieved 5/2/2013, from Platform-Versions. (2013) Platform Versions. Retrieved 02/05/2013, from SANS. (2012). Mobility/BYOD Security Survey. Retrieved 02/11/2013, from Statcounter. (2013) Top 8 Mobile Operating Systems in the United States from Jan 2012 to Jan 2013, StatCounter Global Stats. Retrieved 02/12/13, from Strohmeyer, R. (2011) Why I get apps from amazon, not google, PCWorld, August 31, Retrieved 02/11/13, from Tenable-Security. (2012) Mobile Vulnerability Management Flagged as Top Concern for Security Professionals in Retrieved 02/12/13, from Thomson, G. (2012) BYOD: enabling the chaos, Network Security, 2, 5-8, doi: /s (12) Trend-Micro. (2012) Repeating History. Retrieved from US-CERT. (2011a) Cyber Threats to Mobile Phones. Retrieved 5/2/2013, from US-CERT. (2011b) Protecting Portable s: Physical Security. Retrieved 5/2/2013, from ZDNet. (2013) Does Jailbreaking or Rooting s and BYOD Mix? Retrieved 02/12/13, from

The Challenges of Implementing a Bring Your Own Device Policy

The Challenges of Implementing a Bring Your Own Device Policy BYOD The Challenges of Implementing a Bring Your Own Device Policy MARK HARRIS, Ph.D. KAREN PATTEN, Ph.D. UNIVERSITY OF SOUTH CAROLINA SC-GMIS NETWORK & TELECOM WORKSHOP SALUDA SHOALS RIVER CENTER OCTOBER

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 What are You Trying to Protect? If someone got into your email, what

More information

Mobile Security: Controlling Growing Threats with Mobile Device Management

Mobile Security: Controlling Growing Threats with Mobile Device Management Mobile Security: Controlling Growing Threats with Mobile Device Management As the use of mobile devices continues to grow, so do mobile security threats. Most people use their mobile devices for both work

More information

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones

More information

Mobile Device Management

Mobile Device Management 1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating

More information

Perception and knowledge of IT threats: the consumer s point of view

Perception and knowledge of IT threats: the consumer s point of view Perception and knowledge of IT threats: the consumer s point of view It s hard to imagine life without digital devices, be it a large desktop computer or a smartphone. Modern users are storing some of

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER WHITE PAPER 2 Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them Business success is highly

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect

More information

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com {ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling

More information

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE

More information

White Paper. Data Security. The Top Threat Facing Enterprises Today

White Paper. Data Security. The Top Threat Facing Enterprises Today White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer Advanced Online Threat Protection: Defending Your Online Banking Customers Against Modern Malware and Fraud Andrew Bagnato Senior Systems Engineer Agenda Modern malware a targets Account credentials Financial

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy

More information

Zenprise Device Manager 6.1.5

Zenprise Device Manager 6.1.5 Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

Mobile Device Security

Mobile Device Security Mobile Device Security Through no fault of your own, your company has become 2-3x more exposed to data breaches and loss. How? Through mobile devices. The same tools that are enhancing the way your employees

More information

10 best practice suggestions for common smartphone threats

10 best practice suggestions for common smartphone threats 10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth

More information

THE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers. December 13, 2012 Telephone Seminar/Audio Webcast

THE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers. December 13, 2012 Telephone Seminar/Audio Webcast 1 THE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers Cosponsored with the ABA Law Practice Management Section December 13, 2012 Telephone Seminar/Audio Webcast Android Apps

More information

Securing mobile devices in the business environment

Securing mobile devices in the business environment IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Network Security Report:

Network Security Report: Network Security Report: The State of Network Security in Schools Managing tight budgets. Complying with regulatory requirements. Supporting Internet-based learning technologies. There are many challenges

More information

Kaspersky Security 10 for Mobile Implementation Guide

Kaspersky Security 10 for Mobile Implementation Guide Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful

More information

The Bring Your Own Device Era:

The Bring Your Own Device Era: The Bring Your Own Device Era: Benefits Clearly Justify BYOD, but Businesses Must Mitigate Security, Compliance and Application Performance Risks Executive Overview The Bring-Your-Own-Device (BYOD) era

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

If you can't beat them - secure them

If you can't beat them - secure them If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

Information Security Updates Mobile Security Best Practices for General User

Information Security Updates Mobile Security Best Practices for General User Information Security Updates Mobile Security Best Practices for General User A ccording to research figures from Business Intelligence 1, the number of smartphones sold worldwide has already surpassed

More information

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite. White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

Mobile Device Security Is there an app for that?

Mobile Device Security Is there an app for that? Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Mobile Security BYOD and Consumer Apps

Mobile Security BYOD and Consumer Apps Mobile Security BYOD and Consumer Apps Adam Shnider, Managing Director, Coalfire October 16, 2012 Agenda I. The Mobile World - Trends I. Mobile devices - threats and risks I. BYOD Security Top Five I.

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It

Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It WHITE PAPER: DON T LOSE THE DATA: SIX WAYS YOU MAY BE LOSING........ MOBILE....... DATA......................... Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It Who should

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Bring Your Own Device Bring Your Own Data? Thursday 10th April 2014 Dai Davis Solicitor and Chartered Engineer Partner, Percy Crow Davis & Co

Bring Your Own Device Bring Your Own Data? Thursday 10th April 2014 Dai Davis Solicitor and Chartered Engineer Partner, Percy Crow Davis & Co Bring Your Own Device Bring Your Own Data? Thursday 10th April 2014 Dai Davis Solicitor and Chartered Engineer Partner, Percy Crow Davis & Co Tel: 07785 771 721 E-mail: mail@daidavis.com Overview BYOD

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

Addressing NIST and DOD Requirements for Mobile Device Management

Addressing NIST and DOD Requirements for Mobile Device Management Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW

More information

G DATA MOBILE MALWARE REPORT

G DATA MOBILE MALWARE REPORT G DATA MOBILE MALWARE REPORT THREAT REPORT: Q3/2015 1 CONTENTS At a glance 03-03 Forecasts and trends 03-03 Current situation: almost 6,400 new Android malware instances every day 04-04 What are hacking

More information

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus. Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

Android vs. Apple ios Security Showdown Tom Eston

Android vs. Apple ios Security Showdown Tom Eston Android vs. Apple ios Security Showdown Tom Eston About Your Presenter Tom Eston CISSP, GWAPT Manger of the SecureState Profiling & Penetration Team Specializing in Attack & Penetration, Mobile Security

More information

[BRING YOUR OWN DEVICE POLICY]

[BRING YOUR OWN DEVICE POLICY] 2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2

More information

Enterprise Mobile Threat Report

Enterprise Mobile Threat Report Enterprise Mobile Threat Report The State of ios and Android Security Threats to Enterprise Mobility I. Introduction This report examines enterprise security threats for ios and Android. While Android

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:

More information

Mobile Security & Cybersecurity Issues for Physicians & Patients Across the Care Continuum

Mobile Security & Cybersecurity Issues for Physicians & Patients Across the Care Continuum Mobile Security & Cybersecurity Issues for Physicians & Patients Across the Care Continuum 8th Annual NJ/DV Conference: IT - The Politics of Healthcare October 29, 2015 Atlantic City, NJ William Buddy

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM

More information

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Hot Topics in IT Security PREP#28 May 1, 2014. David Woska, Ph.D. OCIO Security

Hot Topics in IT Security PREP#28 May 1, 2014. David Woska, Ph.D. OCIO Security Hot Topics in IT Security PREP#28 May 1, 2014 David Woska, Ph.D. OCIO Security CME Disclosure Statement The North Shore LIJ Health System adheres to the ACCME s new Standards for Commercial Support. Any

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Use of tablet devices in NHS environments: Good Practice Guideline

Use of tablet devices in NHS environments: Good Practice Guideline Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood

More information

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Successful Mobile Deployments Require Robust Security

Successful Mobile Deployments Require Robust Security By: Maribel D. Lopez FIRMS MUST BUILD SECURITY ENABLED MOBILITY Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as 9irms look to increase productivity

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management Best Practices in Enterprise Mobility Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING

More information

The smartphone revolution

The smartphone revolution Mobile Applications Security Eugene Schultz, Ph.D., CISSP, CISM, GSLC Chief Technology Officer Emagined Security EugeneSchultz@emagined.com ISSA-Los Angeles Los Angeles, California January 19, 2011 Emagined

More information

My CEO wants an ipad now what? Mobile Security for the Enterprise

My CEO wants an ipad now what? Mobile Security for the Enterprise My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager

More information

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will

More information

White Paper: The Current State of BYOD

White Paper: The Current State of BYOD CTOlabs.com White Paper: The Current State of BYOD May 2012 A White Paper providing context and guidance you can use Inside: Snapshot of a fast moving trend Summary of recent surveys Considerations for

More information

Security Best Practices for Mobile Devices

Security Best Practices for Mobile Devices Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices

More information

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us Emerging threats for the healthcare industry: The BYOD Revolution By Luca Sambucci www.deepsecurity.us Copyright 2013 Emerging threats for the healthcare industry: The BYOD REVOLUTION Copyright 2013 Luca

More information

FAQ for ipad (ios 5.x)

FAQ for ipad (ios 5.x) FAQ for ipad (ios 5.x) Content: 1. Connecting to CityU Wireless Local Area Network (CityU WLAN) 2. Setting up the Microsoft Exchange account (for staff only) 3. Setting up the Office365 Exchange online

More information

Tutorial on Smartphone Security

Tutorial on Smartphone Security Tutorial on Smartphone Security Wenliang (Kevin) Du Professor wedu@syr.edu Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security

More information

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program

More information

Digital Consumer s Online Trends and Risks

Digital Consumer s Online Trends and Risks Digital Consumer s Online Trends and Risks Modern consumers live a full-scale digital life. Their virtual assets like personal photos and videos, work documents, passwords to access social networking and

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

Adams County, Colorado

Adams County, Colorado Colorado Independent Consultants Network, LLC Adams County, Colorado Bring-Your-Own-Device Policy Prepared by: Colorado Independent Consultants Network, LLC Denver, Colorado March 20, 2014 Table of Contents

More information

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

Securing your Mobile Environment. Mark Villinski Kaspersky Lab Jeremy Clough Gorham Savings Bank

Securing your Mobile Environment. Mark Villinski Kaspersky Lab Jeremy Clough Gorham Savings Bank Securing your Mobile Environment Mark Villinski Kaspersky Lab Jeremy Clough Gorham Savings Bank These things are everywhere These things are everywhere These things are everywhere These things are everywhere

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Trust Digital Best Practices

Trust Digital Best Practices > ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or

More information

The Mobile Security Challenge: Opportunities & Issues Matthew Young, Security Programs Manager

The Mobile Security Challenge: Opportunities & Issues Matthew Young, Security Programs Manager The Mobile Security Challenge: Opportunities & Issues Matthew Young, Security Programs Manager Mobility -we have come a long way and where is it going? Image: Word Press Mobility To achieve mobility, two

More information

4 Steps to Effective Mobile Application Security

4 Steps to Effective Mobile Application Security Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional

More information

McAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always.

McAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always. McAfee Multi Access from ø Step-by-step guide to protecting your devices. Always. Contents 3 Welcome to McAfee Multi Access 5 Setting up your Windows PC Setting up McAfee Multi Access on your Windows PC

More information

Codeproof Mobile Security & SaaS MDM Platform

Codeproof Mobile Security & SaaS MDM Platform Codeproof Mobile Security & SaaS MDM Platform info@codeproof.com https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,

More information

How To Secure Your Mobile Devices

How To Secure Your Mobile Devices SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information