NetSafe Smartphone Security Report 2014

Size: px
Start display at page:

Download "NetSafe Smartphone Security Report 2014"

Transcription

1 NetSafe Smartphone Security Report 2014 Smartphone Security Report 2014

2 Mobile internet use is soaring in New Zealand with latest figures from December 2013 suggesting 64% of Kiwis aged between 15 and 65 now own a smartphone 1. At the start of this year, Yahoo! Chief Executive Marissa Mayer suggested that 2014 will mark a tipping point in our adoption of technology: By the end of this year we will have more mobile users and more mobile traffic than we have PC traffic. Visitor traffic to NetSafe websites reflects this trend with mobile and tablet use growing. As more New Zealanders have begun using smartphones, NetSafe has revisited a research project from 2011 that looked at the use of and security awareness around mobile technology and has discovered some promising trends. Smartphone use in New Zealand In 2011, it was estimated that 7-10% of New Zealanders owned a smartphone three years on and that figure has soared with almost two out of three people carrying around a small but powerful computer in their pocket every day. NetSafe surveyed 207 smartphone owners for with almost one in 5 (19%) stating that their employer provided the device. This figure has fallen from 32% in 2011 suggesting more New Zealanders are taking advantage of steadily falling prices for consumer electronics and snapping up handsets that allow them to stay connected to their online lives 24/7. In terms of market share, analysis of our 2014 survey respondents shows the following ownership breakdown: Apple iphone 59% Android (all manufacturers) 35% Windows Phone 3% BlackBerry 1% Other 2% Whilst the survey size is small (and this device ownership split may not reflect the wider community) it still allows analysis of behavioral trends and provides a snapshot of Kiwi mobile use. NetSafe defines a smartphone for the purposes of the survey as a mobile offering internet connectivity and services beyond the ability of an older feature phone. 1 Frost & Sullivan New Zealand Mobile Device Usage will- have- 90- smartphone- and- 78- tablet- ownership- by htm 2 Survey methodology: NetSafe published an online survey for 2014 and received responses from Survey methodology: NetSafe published an online survey for 2014 and received responses from 207 anonymous individuals who identified that they use a smartphone to access online services. Respondents were asked a variety of questions around device use and loss, technical capability and awareness and use of security functionality including handset locking and mobile anti- virus products. The 2014 survey asked 23 questions including country of residence and age and replicated the majority of questions first asked in April The mean age of respondents was 38 with 190 stating that they lived in New Zealand.

3 NetSafe Smartphone Security Report 2014 More Kiwis banking and transacting on mobiles 62% of New Zealand residents who responded to the survey used their smartphone to bank online with dedicated banking apps five times more popular than using a website. 64% of people had completed a purchase using their smartphone - buying from websites, winning online auctions, purchasing in- app credits or add- ons or paying for music or other digital downloads.

4 Smartphone security challenges The most significant risk for smartphone owners is the physical loss of their device. With just over one in four Kiwis who responded to the survey admitting to having lost a mobile phone, security of the handset and the contacts, data and apps within remains a key concern for individuals and for businesses that provide employees with an expensive device to enable them to work on the move. 28.5% Yes No 71.5% Figure 1: Have you ever lost a mobile phone? (NZ residents) The small size of most smartphones makes them easy to lose and the resale value of stolen handsets means they are also attractive for opportunistic thieves. A new phrase, Apple picking the targeting of Apple devices by thieves has been coined by US police 3 and around percent of thefts in major American cities involve mobile phones 4. The average smartphone owner inputs a vast amount of personal and/or business data into their device and losing your phone can open up unwanted access to friends and family, your social networks, work or personal accounts and potentially give access to confidential business systems. Lock up your life The easiest way to mitigate the impact of losing your smartphone is to use a lockscreen to prevent causal access to your phone and the data within. 3 Apple picking: how the iphone became an object worth killing for - picking- stolen- iphones_n_ html 4 FCC announces new initiatives to combat massive smartphone and data theft A1.pdf

5 In 2011, only 66% of Kiwis reported that they used a pin number or swipe pattern to keep their device secure. In 2014 that number had risen to almost 9 out of 10 smartphone owners with manufacturers and app developers introducing a range of options that includes longer passwords, facial recognition and even biometric measures such as fingerprint scanning to secure devices: 0.5% 8.0% PIN number 10.6% 10.1% 13.3% 57.4% Fingerprint or other biometric option None of the above, the phone is not locked Swipe pattern Password Facial recognition Figure 2: Do you need a PIN number, swipe pattern, password or other log on feature to access and use the phone? The rapid adoption of BYOD in the workplace has also been accompanied with increased knowledge of the need to protect devices and how they are used. Where an employer provided the mobile, respondents suggested that almost three quarters of businesses (71%) now have policies and procedures in place to advise staff on the use and security of their smartphone. The picture was vastly different in 2011 with only 38% of respondents receiving such guidance. Mobile malware and protecting your device Anti- virus software has been the keystone of any computer security strategy for a long time in the world of desktop computing. Mobile malware has been touted as the next big cyber threat for several years and in 2011 only 13% of Kiwi smartphone owners were using anti- virus software on their device. In 2014, this figure had risen to 25% of survey respondents, with more than half of Android owners where the malware threat is perceived to be most serious suggesting they were using security software on their phone as an additional line of defence. When asked if their smartphone had shown signs of a computer virus style infection with data or apps being lost, premium rate texts being sent without

6 permission or slow internet access or excessive data use, almost 4% of Kiwis suggested they had experienced this issue. NetSafe has only received one report to date of mobile malware affecting an older Android- powered smartphone where the handset was reset to factory settings via a browser- based exploit. A recent report from UK media regulator Ofcom suggested that 2% of British adults they surveyed had experienced a virus, Trojan or malware on their phone 5. Looking at New Zealand responses, NetSafe found that the majority of issues reported concerned free games or intrusive advertising suggesting that mobile malware has yet to be a significant issue locally. Media coverage in May of Koler ransomware targeting Android devices 6 suggests threats continue to emerge. However, the end user must normally agree to install a rogue app or APK before the handset is affected. Increasing awareness of smartphone challenges is essential to ensure owners are proactive in protecting their own devices. Tools and technology can help Smartphone manufacturers and software companies alike have recognised the risk of a mobile device being lost or stolen and have responded by offering easy ways to track, lock or wipe handsets remotely. Apple s Find My iphone service and Google s equivalent Android Device Manager make it easy for consumers to find lost smartphones or tablets. Popular security software suites can also be installed to deliver similar functionality. Enterprise device management options are available to businesses that also allow a corporate owner to prevent the installation of unauthorised apps or restrict device functionality. In 2011, 53% of survey respondents were able to use this technology to remotely lock or wipe their phone with a large number of people unaware this ability existed. Three years on, 65% of people confirmed they had this facility to protect their smartphone. Almost three quarters of Kiwis stated that they could find their device using an online system and one in three had actually used this technology in the past with two individuals calling for police assistance to recover a phone once located. 5 Ofcom Adults Media Use and Attitudes Report data- research/other/research- publications/adults/adults- media- lit- 14/ 6 Police Locker land on Android Devices - locker- available- for- your.html

7 NetSafe Smartphone Security Report 2014 Smartphones contain valuable data 75% of New Zealand residents who responded to the survey believed there was nothing sensitive stored on their smartphone. 8% of smartphone owners stated that they kept account passwords or other important information in plain text on their phone.

8 Data security and backing up When asked if they stored important information or passwords on their smartphone, three quarters of respondents believed there was nothing sensitive on their device. Given the ability of many apps and in- built phone components to track location, record calls or access contact lists or text messages, this figure indicates a surprising level of naiveté among users. Many smartphone owners may not fully comprehend the volume of data stored on their phone as they message friends and family, conduct transactions, surf the web or travel around with a device that could function as a tracking beacon. Almost one in ten owners (8%) stated that they kept account passwords or other important information in plain text on their phone. At the other end of the spectrum, almost a fifth said they were using a password manager tool to handle login information and store passwords securely. The unintentional disclosure of data stored on a smartphone was highlighted by the European Union Agency for Network and Information Security (ENISA) as a high risk in their 2010 Smartphone Security Report. 7 Individuals and business owners should think carefully about the volume of information stored on a mobile device and use built- in security features or additional security options to protect their device in the event of loss or theft. 62% of survey respondents stated that they routinely backed up their smartphone, a process that differs across manufacturers and operating systems. Yes, I backup my full phone 40.2% 51.3% Yes, I backup my SIM card / contacts No 8.5% Figure 3: Do you backup your phone to another computer or copy contacts from your SIM card? 7 Smartphones: Information security risks, opportunities and recommendations for users - and- trust/risks- and- data- breaches/smartphones- information- security- risks- opportunities- and- recommendations- for- users

9 Network security on the move Despite mobile data costs falling in New Zealand, many smartphone owners continue to make use of opportunities to save money and connect to free or open Wi- Fi networks when travelling. In 2011, 57% of Kiwis used free Wi- Fi hotspots. Three years later, 62% of survey respondents were using Wi- Fi connections but only 15% of those doing so also used a VPN connection to provide additional security to encrypt their activities online. One individual commented: I rely on my own data plan as do not trust free Wi- Fi NetSafe has continued to highlight the potential risks of so- called evil twin attacks where Wi- Fi networks are set- up to intercept internet activity. ENISA considers these Network Spoofing Attacks as medium risk but the potential is there for financial transactions to be recorded and the Banking Ombudsman issued a warning in February about sending sensitive information in s over free Wi- Fi after a New Zealand couple lost a six- figure sum. The future of mobile payments The ubiquity of mobile internet access now offered by smartphones allows anyone to perform a range of tasks on the move. Financial transactions are made easy by mobile network operators billing account customers directly and the banking sector has seized upon the app ecosystem as a way to offer their retail and business customers the ability to take payments on the spot. Near Field Communication (NFC), ibeacon and other technologies are presented as a way to turn the mobile phone into a consumer wallet with the potential for one device to store identification information, hold proprietary credits or to pay for items in- store. Three years ago, NetSafe asked if survey respondents were keen to see this type of technology rolled out more widely and 55% supported mobile payments. In 2014, 6% of Kiwis had already used NFC enabled payments but concerns about security meant that only 40% of those asked were now keen to use this technology for themselves. As convergence and mobility become key drivers for internet use, more may need to be done to reassure smartphone owners that device security or application security frameworks are effective at preventing financial losses or that policies are in place to support consumers who find themselves out of pocket for any reason. Patching and updating smartphones 8 Using unsecured public Wi- Fi risky business -

10 Keeping your operating system and software up to date has been a consistent message for desktop computer users for a long time. This discipline is also needed for smartphones. Whilst Apple, Microsoft s Windows Phone and Google s Android platforms take a different approach to their operating systems, patching regimes and app deployment processes, the end user still retains some control over keeping their smartphone up to date. When compared with ios- powered iphones, Android is normally associated with devices across the full price spectrum and this has allowed some manufacturers to sell smartphones and tablets that run on older versions of the operating system. When asked what operating system their smartphone was powered by, the majority of Apple owners were using ios version 7 (93%). Apple s managed ecosystem actively encourages owners to update their devices regularly and there have been several security patches deployed for ios 7 as more attention has been paid to Apple security vulnerabilities over recent months. Android owners can find their upgrade path complicated by network operator or manufacturer customisations and this was reflected in responses given by survey respondents. Only 20% of Kiwi- owned Android devices were powered by the latest OS, version 4.4 named KitKat. In 2011, 12% of survey respondents stated that their smartphone was jailbroken - where they had modified the original operating system or 'unlocked' the phone. This figure declined substantially in 2014 with only 5% of Kiwis confirming they were using a jailbroken handset. App security and user best practice The app economy is booming and official and unofficial app stores can provide a myriad of options for the bored or productive smartphone owner alike. Almost all survey respondents had downloaded apps to their device but almost a quarter admitted to not checking what permissions they required and what data the app could access on the phone. Malicious apps have been an issue for all the major smartphone manufacturers with media coverage regularly highlighting the risk associated with fake or cloned apps designed to part owners from their money, snoop on phone data or potentially run up large bills via text or data usage. A recent example of this would be the discovery that screensaver apps have been used to build a botnet secretly mining bitcoins for the developers 9. Smartphone owners should take the time to read store reviews and check for reported bugs before installing new games or services on their device. Only downloading from 9 BadLepricon malware caught stealth- mining bitcoin in Android apps - malware- bitcoin- mining- android- apps

11 official app stores can minimise risk. Owners also need to be aware of what system permissions and data on the phone each application requests access to. Figure 4: Protect Your Privacy on Your Mobile Device - Some high profile security vendors have seen fake copies of their anti- virus products listed for purchase in app stores so owners need to be alert to mis- spellings or poor grammar. Installing apps from unofficial sources on Android can also put you at increased risk as can sideloading APK files. An example of this would be smartphone owners browsing porn websites who have been enticed into downloading and installing a video player to watch adult content which subsequently acts as the delivery method for ransomware 10. Smartphone owners undertaking online banking on their device should also be alert to apps masquerading as official offerings although to date banking Trojans designed to intercept financial transactions have been an issue mainly affecting countries outside of New Zealand 11 : 10 Your Android phone viewed illegal porn. To unlock it, pay a $300 fine android- phone- viewed- illegal- porn- to- unlock- it- pay- a fine/ 11 Mobile banking threats around the world in Q Kaspersky Lab -

12 Figure 5: Mobile banking threats around the world in Q (Kaspersky Lab) The ability to send targeted spam and phishing s to mobile devices continues to be an issue for owners and employers. 95% of survey respondents stated that they could read and reply to work or personal s on their smartphone. Smishing or phishing messages have been shown to be three times more effective at harvesting login information on mobiles 12 as small screen sizes can prevent owners from recognizing visual clues that are more obvious on desktop computers. It can also be harder to confirm the full URL of a destination site or check the details of a secure certificate before entering login information. Device owners should avoid responding to spam text messages or clicking on the links they include to strange looking website URLs. A message sent to a smartphone can often trigger a notification that may reinforce the sense of urgency to respond or take action. 12 Phishing, smishing and how a casual click can deliver a nasty surprise - smishing- and- how- a- casual- click- can- deliver- a- nasty- surprise/

13 Smartphone Security Challenges ENISA 14 No. Title Risk Description 1 Data leakage resulting from device loss or theft 2 Unintentional disclosure of data 3 Attacks on decommissioned smartphones High High High The smartphone is stolen or lost and its memory or removable media are unprotected, allowing an attacker access to the data stored on it. The smartphone user unintentionally discloses data on the smartphone. The smartphone is decommissioned improperly allowing an attacker access to the data on the device. 4 Phishing attacks Medium An attacker collects user credentials (such as passwords and credit card numbers) by means of fake apps or (SMS, ) messages that seem genuine. 5 Spyware attacks Medium The smartphone has spyware installed, allowing an attacker to access or infer personal data. Spyware covers untargeted collection of personal information as opposed to targeted surveillance. 6 Network Spoofing Attacks Medium An attacker deploys a rogue network access point (Wi- Fi or GSM) and users connect to it. The attacker subsequently intercepts (or tampers with) the user communication to carry out further attacks such as phishing. 7 Surveillance attacks Medium An attacker keeps a specific user under surveillance through the target user s smartphone. 8 Diallerware attacks Medium An attacker steals money from the user by means of malware that makes hidden use of premium SMS services or numbers. 9 Financial malware attacks Medium The smartphone is infected with malware specifically designed for stealing credit card numbers, online banking credentials or subverting online banking or ecommerce transactions. 10 Network congestion Low Network resource overload due to smartphone usage leading to network unavailability for the end- user. 14 The top ten information security risks for smartphone users - and- CIIP/critical- applications/smartphone- security- 1/top- ten- risks

14 Smartphone Security Challenges - Summary Figure 6: Our 2011 report identified a range of challenges connected to the loss of a handset or an attacker gaining access to the apps or data on the device The image above was originally created in 2011 to highlight potential risks to smartphone owners. The New Zealand Law Society produced an updated version for the October 2013 edition of their Law Talk magazine 13, which can be freely accessed online. Risks can be summarised as follows: 1. Physical loss Losing your phone can provide access to your device and data, especially if the handset is not protected by a lockscreen. Losses can include your contacts and other stored information, the cost of any texts sent or data used. If financial information or app logins are stored on the phone (and do not require further authentication by the re- entry of a password or PIN) an attacker or thief may be able to access bank accounts or accounting information. Reputational harm can also be caused if the handset is used to send spam or scam s to friends or business contacts, message social networks 13 NZ Law Talk, Issue archives/issue- 830

15 or to impersonate the original owner. 2. Malware Smartphone owners should patch operating systems and apps to avoid emerging mobile malware threats and consider installing anti- virus software. Fake or cloned apps can harvest data or incur network costs if premium rate texts are sent without permission. Apps which leak data should be considered a privacy risk. Sideloading copies of popular apps from unofficial marketplaces or installing APK files to watch adult videos are examples of current malicious threats. 3. Phishing and smishing Smishing involves sending spam text messages designed to direct owners to malware websites or imposter banking sites that record login information for later use. Smartphone owners may be less conditioned to receiving mobile spam. They can also find it hard to detect the visual clues that are more obvious in standard phishing attacks due to the small size of the screen and an inability to review a linked URL. 4. Wi- Fi network spoofing Open hotspots are a popular way to save on mobile internet costs. Connecting to a free Wi- Fi network can allow full use of all smartphone functionality but unencrypted connections or network access points set up to record internet traffic can allow cyber criminals to record login information. Financial transactions should only be undertaken on a secure network. Owners can boost their security by using a VPN service to encrypt data. 5. Privacy concerns Location services on smartphones can add a new dimension to local search tools or aid online marketers looking to monitor customer behavior. GPS tagging can assist with storing photo location data and has transformed the navigation market. Device owners should examine just how much location data they share with online services and what information the apps they choose to install can pass back to their developers.

16 Smartphone Security Advice 1. Lock your smartphone Use a pin, password, complex swipe or other option to restrict access to your phone should it be lost or stolen. Whilst there may still be ways for persistent attackers to gain access to your device, taking steps to prevent casual use is essential and helps secure the contents of your phone especially your photos and contacts - from prying eyes. Check settings to enable automatic screen locking after several minutes of non- use. 2. Investigate security software that lets you find, lock, wipe or disable your phone Many popular smartphones come with easy options to help you locate your device, flash up a message on screen to anyone finding it or to activate a loud noise to aid recovery or deter a thief. This may be part of the operating system or available as a stand alone app or bundled with an anti- virus security suite. 3. Consider installing anti- virus software Smartphone operating systems are constantly being improved with steps taken to patch security holes as they are made public. Although the majority of malware or malicious software remains focused on desktop computers, 99% of mobile malware is targeted at Android devices 15 and an anti- virus package is another line in your defence. New computer security threats are being developed every day and mobile malware continues to be highlighted as an emerging risk. 4. Keep your operating system up to date How easy this task is depends on your chosen device but NetSafe encourages smartphone owners to actively apply operating system updates when made available. Newer versions of software tend to more secure and your smartphone is a powerful computer that also needs protecting. 5. Be cautious about what apps you install Stick with the official marketplaces to avoid installing malicious software and be cautious about what permissions are requested during the installation process. Does that free game really need to be able to read or send text messages or access your camera? Many mobile malware threats are developed and most active in Russia, Kazakhstan, Belarus, and Ukraine but security companies have reported malware being detected in more than 50 countries to date. 15 Data suggests Android malware threat greatly overhyped - suggests- Android- malware- threat- greatly- overhyped

17 6. Jailbreak at your own risk There may be some benefits to trying out a new operating system for your smartphone but dumping the manufacturer s system can also expose you to increased risk. Make sure you fully understand what the process involves and any additional security features that may be required to avoid malware threats. 7. Backup your device and the data stored on it Imagine the downside to losing your phone and with it your full list of contacts or photos from a recent trip. Try to keep a clean device by routinely removing data that doesn t need to be kept on your phone just in case you lose it or someone gets access to your collection of risky selfies. 8. Consider the risks of using free Wi- Fi The potential for having your s, banking transactions or purchases intercepted may seem small but NetSafe would still encourage smartphone owners to stick with trusted data connections or your home Wi- Fi for sensitive activities. Investigate Virtual Private Network (VPN) security apps if you really need to connect to open hotspots. 9. Don t click on links or open attachments you weren t expecting Text spam continues to be an issue for mobile owners so avoid responding to lottery or competition messages or clicking on links they include to strange looking websites. You can forward spam texts to 7726 where the Department of Internal Affairs monitors spam arriving from around the world. If you can read your personal or business s on your phone, be alert to standard phishing messages that are often more successful at sucking in victims due to the small screen size and the sense of urgency they can create by triggering a notification. 10. Be wary of sharing your smartphone with others Kids love to play games and a loaded smartphone can be a handy babysitting option for bored children in a restaurant or social setting. Be aware though that it doesn t take much for someone borrowing your phone to accidentally post a rogue tweet to a work social media account or to send an SMS or to your business contacts. Investigate ways to lock down what apps or functions can be used or simply keep the device for work use only. 11. Be alert to your smartphone behaving oddly Check your bills regularly to see if text messages especially to premium rate or overseas numbers are being sent without you noticing. Similarly, high data usage may signify a problem with your phone or an app you have installed. If the battery is draining rapidly this could be a sign that other apps or processes are operating in the background so check to see what is running on the device.

18 12. Securely erase personal information before reselling or recycling If you re thinking of selling or recycling your smartphone before upgrading, think carefully about the data stored on the phone and delete all apps and related data before wiping or securely erasing personal information. iphone owners can use Apple s factory reset to perform this task, Android and Windows Phone owners can use similar options or install Blancco Mobile Edition on a PC to thoroughly delete data.

19 I ve lost my phone what do I do now? It pays to take preventative steps to protect your phone should you lose it or have it stolen installing software or activating the manufacturer s service may let you track, lock or wipe the data in the future. It s also worth recording the unique IMEI number of the handset, which can often be found on the original packaging, under the battery or via the operating system settings. Keep a note of this number and consider storing it alongside other electronic assets you own on the NZ Police website at Contact your mobile network operator Once you know your phone is missing, contact your telecoms company for help and advice and consider the new mobile handset blacklisting option. 2degrees or- stolen- phone Telecom Vodafone phones/lost- or- stolen/ Mobile Handset Blacklisting If you lose your handset and don t want someone else using it on an NZ mobile network, you can have the handset blacklisted or IMEI blocked. To blacklist or un- blacklist your device contact your network provider using the details above. To check the status of an IMEI number you can use the Telecommunications Forum checker tool online at If you re considering buying a used handset it may be worth checking that the phone hasn t been blocked on New Zealand networks before you part with your cash. Report the lost or stolen phone to NZ Police Making a police report may help you recover your phone and may also be required if you want to make an insurance claim. You can find the details for your local police station in the phone book or on the website.

NetSafe Smartphone Security Report 2014

NetSafe Smartphone Security Report 2014 NetSafe Smartphone Security Report 2014 Smartphone Security Report 2014 Smartphone Security Advice 1. Lock your smartphone Use a pin, password, complex swipe or other option to restrict access to your

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

Mobile Operating Systems & Security

Mobile Operating Systems & Security Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

Security Best Practices for Mobile Devices

Security Best Practices for Mobile Devices Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should

More information

Digital Consumer s Online Trends and Risks

Digital Consumer s Online Trends and Risks Digital Consumer s Online Trends and Risks Modern consumers live a full-scale digital life. Their virtual assets like personal photos and videos, work documents, passwords to access social networking and

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

BOYD- Empowering Users, Not Weakening Security

BOYD- Empowering Users, Not Weakening Security BOYD- Empowering Users, Not Weakening Security Table of Contents Exec summary... 3 Benefits of BYOD... 4 Threats that BYOD Harbours... 5 Malware... 5 Data Leakage... 5 Lost or Stolen Devices... 5 Public

More information

Email and Security. U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1

Email and Security. U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1 Email and Security U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1 Agenda Introduction Email Security Q&A Introduction Gary Harding email:- U3A@GaryHarding.com Spent more than 40 years working in the

More information

Connect Smart for Business SME TOOLKIT

Connect Smart for Business SME TOOLKIT Protect yourself online Connect Smart for Business SME TOOLKIT WELCOME To the Connect Smart for Business: SME Toolkit The innovation of small and medium sized enterprises (SMEs) is a major factor in New

More information

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012 Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Mobile Security: Controlling Growing Threats with Mobile Device Management

Mobile Security: Controlling Growing Threats with Mobile Device Management Mobile Security: Controlling Growing Threats with Mobile Device Management As the use of mobile devices continues to grow, so do mobile security threats. Most people use their mobile devices for both work

More information

Mobile phone security. Prof. Do van Thanh

Mobile phone security. Prof. Do van Thanh Mobile phone security Prof. Do van Thanh Introduction Why do we need mobile phone security? Is the mobile phone a secure device? The answer is: Yes, but only until recently Indeed malware starts to appear

More information

FRAUD PROTECTION AND ONLINE SAFETY 2015 EDITION

FRAUD PROTECTION AND ONLINE SAFETY 2015 EDITION FRAUD PROTECTION AND ONLINE SAFETY 2015 EDITION 1 Table of Contents Mobile Device Settings Creating & Managing Passwords Phishing & Imposter Scams Healthcare, Charity, and Lottery Scams Identity Theft

More information

F-Secure Mobile Security. Android

F-Secure Mobile Security. Android F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from

More information

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Basic Security Considerations for Email and Web Browsing

Basic Security Considerations for Email and Web Browsing Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable

More information

Kaspersky Security 10 for Mobile Implementation Guide

Kaspersky Security 10 for Mobile Implementation Guide Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

-------------------------------------------------------------------------------------------------------------

------------------------------------------------------------------------------------------------------------- Fast Facts: On average, around one-third of employees travel regularly for work Just one in three companies, however, prepares for these trips by implementing security guidelines and other measures. This

More information

Is your business secure in a hosted world?

Is your business secure in a hosted world? Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer

More information

MOBILE BANKING USER GUIDE

MOBILE BANKING USER GUIDE MOBILE BANKING USER GUIDE CentricBank.com DrCentricBank.com 717.657.7727 Centric Bank does not currently charge a fee for Mobile Banking. However, your mobile phone provider may charge data usage fees

More information

Perception and knowledge of IT threats: the consumer s point of view

Perception and knowledge of IT threats: the consumer s point of view Perception and knowledge of IT threats: the consumer s point of view It s hard to imagine life without digital devices, be it a large desktop computer or a smartphone. Modern users are storing some of

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

Agenda. John Veldhuis, Sophos The playing field Threats Mobile Device Management. Pagina 2

Agenda. John Veldhuis, Sophos The playing field Threats Mobile Device Management. Pagina 2 Mobile Security Agenda John Veldhuis, Sophos The playing field Threats Mobile Device Management Pagina 2 The Changing Mobile World Powerful devices Access everywhere Mixed ownership User in charge Powerful

More information

Mobile Security BYOD and Consumer Apps

Mobile Security BYOD and Consumer Apps Mobile Security BYOD and Consumer Apps Adam Shnider, Managing Director, Coalfire October 16, 2012 Agenda I. The Mobile World - Trends I. Mobile devices - threats and risks I. BYOD Security Top Five I.

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

U.S. DEPARTMENT OF STATE OVERSEAS SECURITY ADVISORY COUNCIL TRAVELING WITH MOBILE DEVICES: TRENDS & BEST PRACTICES JULY 2015

U.S. DEPARTMENT OF STATE OVERSEAS SECURITY ADVISORY COUNCIL TRAVELING WITH MOBILE DEVICES: TRENDS & BEST PRACTICES JULY 2015 U.S. DEPARTMENT OF STATE OVERSEAS SECURITY ADVISORY COUNCIL TRAVELING WITH MOBILE DEVICES: TRENDS & BEST PRACTICES JULY 2015 Day-to-Day Internet Access 15% Why Pack your Smartphone? Work Email Survey Says:

More information

Smart Ideas for Smartphone Security

Smart Ideas for Smartphone Security Page 1 of 6 8814 Fargo Road, Suite 105 Richmond, Virginia 804.360.4490 www.seltekinc.com July 2013 Computer Forensics IT Support Security ediscovery Security Apps for your Smartphone Smart Ideas for Smartphone

More information

Using apps safely and securely on your mobile

Using apps safely and securely on your mobile Using apps safely and securely on your mobile In association with: Apps are becoming an increasingly important way to communicate and access the internet through our phones, tablets and TVs. We use them

More information

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them The Increasing Threat of Malware for Android Devices 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them INTRODUCTION If you own a smartphone running the Android operating system, like the

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Social Media and Cyber Safety

Social Media and Cyber Safety Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant andrew@justbesafe.com Social Media and Cyber Safety Our instructor today

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

TMCEC CYBER SECURITY TRAINING

TMCEC CYBER SECURITY TRAINING 1 TMCEC CYBER SECURITY TRAINING Agenda What is cyber-security? Why is cyber-security important? The essential role you play. Overview cyber security threats. Best practices in dealing with those threats.

More information

GlobalSign Malware Monitoring

GlobalSign Malware Monitoring GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...

More information

Almost 400 million people 1 fall victim to cybercrime every year.

Almost 400 million people 1 fall victim to cybercrime every year. 400,000000 Almost 400 million people 1 fall victim to cybercrime every year. A common way for criminals to attack people is via websites, unfortunately this includes legitimate sites that have been hacked

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

7 Simple Smartphone Privacy Tips:

7 Simple Smartphone Privacy Tips: 7 Simple Smartphone Privacy Tips: An Exclusive White Paper for Deluxe Customers by John Sileo CT22JSWP Most business people think of their smartphone as a highly critical and necessary tool in running

More information

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500 INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information

More information

Secure Your Information and Communication Technology Devices

Secure Your Information and Communication Technology Devices You should pay attention to the following items bef the Internet: Secure Your Information and Communication Technology Devices Install proper anti-virus software P.3 Log on as a user and not as an administrator

More information

Cyber Security Education & Awareness. Guide for User s

Cyber Security Education & Awareness. Guide for User s Cyber Security Education & Awareness Guide for User s Release Q1 2010 Version 1.1 CONTENTS 1. Introduction 2. Protection against Nasty Code 3. System Security Maintenance 4. Personal Firewalls 5. Wireless

More information

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 What are You Trying to Protect? If someone got into your email, what

More information

2015 MDRT Annual Meeting e Handout Material. What is Your Smartphone Leaking?

2015 MDRT Annual Meeting e Handout Material. What is Your Smartphone Leaking? 2015 MDRT Annual Meeting e Handout Material Title: Speaker: What is Your Smartphone Leaking? Anwar Visram, CISSP Presentation Date: Wednesday, June 17, 2015 10:00 11:00 a.m. The Million Dollar Round Table

More information

In 2015, just under half (43%) of the world s population has an Internet connection: 3.2 billion people, compared to 2.9 billion in July 2014.

In 2015, just under half (43%) of the world s population has an Internet connection: 3.2 billion people, compared to 2.9 billion in July 2014. Contents Introduction... 1 Main findings... 2 Methodology... 3 Section 1. Device usage... 4 Section 2. Online and on the move: Internet activity... 6 Section 3. The connected treasure chest: what is stored

More information

ANDRA ZAHARIA MARCOM MANAGER

ANDRA ZAHARIA MARCOM MANAGER 10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal

More information

Protection from Fraud and Identity Theft

Protection from Fraud and Identity Theft Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...

More information

Guidelines for smart phones, tablets and other mobile devices

Guidelines for smart phones, tablets and other mobile devices Guidelines for smart phones, tablets and other mobile devices Summary Smart phones, tablets and other similar mobile devices are being used increasingly both privately and in organisations. Another emerging

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

10 best practice suggestions for common smartphone threats

10 best practice suggestions for common smartphone threats 10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth

More information

SECTOR 2015 Malware Activity in Mobile Networks Kevin McNamee (Alcatel-Lucent)

SECTOR 2015 Malware Activity in Mobile Networks Kevin McNamee (Alcatel-Lucent) SECTOR 2015 Malware Activity in Mobile Networks Kevin McNamee (Alcatel-Lucent) Agenda How the data is collected Lies, Damn Lies and Statistics Windows PC Malware Android Malware Examples of malware Conclusion

More information

8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014

8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014 8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014 8 Ways to Better Monitor Network Security Threats in the Age of BYOD 2 Unless you operate out of a cave, chances are your

More information

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com {ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling

More information

What you can do prevent virus infections on your computer

What you can do prevent virus infections on your computer What you can do prevent virus infections on your computer A computer virus is program code which 'hides' in other files and can cause irreparable damage to your computer. Computer viruses spread easily

More information

Enterprise Global Security in an era of Hybrid Cloud and Smart Mobile

Enterprise Global Security in an era of Hybrid Cloud and Smart Mobile Enterprise Global Security in an era of Hybrid Cloud and Smart Mobile M. Asif Riaz, CISM, CISSP, CEH Agenda Users are demanding access to applications and services from wherever they are, whenever they

More information

NQ Mobile Security Frequently Asked Questions (FAQs) for Android

NQ Mobile Security Frequently Asked Questions (FAQs) for Android NQ Mobile Security Frequently Asked Questions (FAQs) for Android Introducing Mobile Security NQ Mobile Security protects your mobile device against viruses and malware, while keeping your system running

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

Top 10 Tips to Keep Your Small Business Safe

Top 10 Tips to Keep Your Small Business Safe Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How

More information

Comodo Mobile Security for Android Software Version 2.5

Comodo Mobile Security for Android Software Version 2.5 Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile

More information

Cybercrime Prevention and Awareness

Cybercrime Prevention and Awareness April, 2014 Cybercrime Prevention and Awareness Basic Security Principles to Help You Better Navigate Through Cyberspace To join conference call dial (305) 433-6663 option 4 PIN # 42014 Presented by: Miguel

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:

More information

White Paper. Three Steps To Mitigate Mobile Security Risks

White Paper. Three Steps To Mitigate Mobile Security Risks White Paper Three Steps To Mitigate Mobile Security Risks Bring Your Own Device Growth The Bring Your Own Device (BYOD) trend caught on with users faster than IT expected, especially as ios and Android

More information

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Protecting Your Network Against Risky SSL Traffic ABSTRACT Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

Security Awareness. ITS Security Training. Fall 2015

Security Awareness. ITS Security Training. Fall 2015 Security Awareness ITS Security Training Fall 2015 Why am I here? Isn t security an IT problem? Technology can address only a fraction of security risks. You are a primary target, or rather, your data

More information

How To Protect Your Information From Being Hacked By A Hacker

How To Protect Your Information From Being Hacked By A Hacker DOL New Hire Training: Computer Security and Privacy Table of Contents Introduction Lesson One: Computer Security Basics Lesson Two: Protecting Personally Identifiable Information (PII) Lesson Three: Appropriate

More information

BYOD in the Enterprise

BYOD in the Enterprise BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security whitepapers@contextis.co.uk October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515

More information

Securing your Mobile Environment. Mark Villinski Kaspersky Lab Jeremy Clough Gorham Savings Bank

Securing your Mobile Environment. Mark Villinski Kaspersky Lab Jeremy Clough Gorham Savings Bank Securing your Mobile Environment Mark Villinski Kaspersky Lab Jeremy Clough Gorham Savings Bank These things are everywhere These things are everywhere These things are everywhere These things are everywhere

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the

More information

Information Security. Annual Education 2014. Information Security. 2014 Mission Health System, Inc.

Information Security. Annual Education 2014. Information Security. 2014 Mission Health System, Inc. Annual Education 2014 Why? Protecting patient information is an essential part of providing quality healthcare. As Mission Health grows as a health system and activities become more computerized, new information

More information

Are free Android virus scanners any good?

Are free Android virus scanners any good? Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)

More information

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention

More information

Mobile Device Security

Mobile Device Security Mobile Device Security Presented by Kelly Wilson Manager of Information Security, LCF Research New Mexico Health Information Collaborative (NMHIC) and the New Mexico Health Information Technology Regional

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure! INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!

More information

How To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise)

How To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise) Plugging the Holes in Mobile Security: The Rising Threat Jennifer M. Pigg, VP of Research, Yankee Group Nick Wade, Group Product Manager, Symantec June 2011 Copyright 2011. Yankee Group Research, Inc.

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Securing mobile devices in the business environment

Securing mobile devices in the business environment IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile

More information

Corporate Account Take Over (CATO) Guide

Corporate Account Take Over (CATO) Guide Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,

More information