Mobile Devices Using Without Losing
|
|
- Evan O’Connor’
- 8 years ago
- Views:
Transcription
1 Mobile Devices Using Without Losing Mark K. Mellis Associate Information Security Officer Stanford University Information Security Office Tech Briefing 30March 2012
2 We all have mobile devices iphones, ipads, Droids There s an App for that! What can we do to protect our own privacy and the University s data while enjoying the convenience of mobile personal computing devices? Mobile Devices Using Without Losing
3 Preview Risks of Mobile Computing Tips What If You Lose Your Phone? Review MDM Walk Through (if we have time) Mobile Devices Using Without Losing
4 The Future is Mobile Mobile Devices Using Without Losing
5 What do we use at Stanford? Mobile Devices Using Without Losing
6 Risks - What s on the device? Not merely documents Access credentials for networks and applications Presentations / Briefing Notes Stanford (including secure ) Address Book information Personal photos, movies, and Personal health, salary, and benefits information Indirect costs Regulatory Issues, Reputation Impact (think donors ) Enough to make you wish you never heard of computers should you lose it Mobile Devices Using Without Losing
7 Risks What could happen? Loss or Theft of the Device At security inspection points In cabs and airplanes Public places, hotel rooms, and offices Confiscation of the Device By the local police department, US Government, or other governments Spying Reading over the shoulder Targeted attacks planting keyloggers or other malware Intercepting network traffic Mobile Devices Using Without Losing
8 Stanford s Policy Mobile devices used to store or access Restricted Information (per AGM 63) are required to be managed with an approved mobile device management system (e.g. Stanford MDM) and profile (e.g. the MDM Restricted profile). Examples include Health Information, including Protected Health Information (PHI), Passport and visa numbers, and export controlled information under U.S. law. More information about information classification and handling at: Mobile Devices Using Without Losing
9 Label your device A label can help honest people return your lost device, even if the battery is dead. Anonymous labels are available the round label pictured came from stuffbak.com Mobile Devices Using Without Losing
10 Use a passcode A four digit passcode is plenty unless you access Restricted Data Don t use or Set the screen to auto-lock after a minute or two Set the phone to erase itself if the wrong passcode is entered too many times ten or more is fine Mobile Devices Using Without Losing
11 A digression on passcodes Daniel Amitay studied* the most-used f0ur digit PINs used in his app - 204,508 samples Top ten (in order of popularity) were 1234, 0000, 2580 (vertical line), 1111, 5555, 5683 (LOVE), 0852 (vertical line), 2222, 1212, 1998 (birth year?) Of these, 1234, 0000, 1111, 2222, 1212 are blocked by the MDM passcode policy. Beware of the others! * Mobile Devices Using Without Losing
12 Phones - Keep the software updated Updates are issued frequently as new vulnerabilities are exposed, the vendor patches them. Applies to both the basic device software and applications for ios devices, the operating system is updated via itunes or over the air, and applications are updated via the App Store. The update story is not so nice for Androids. Mobile Devices Using Without Losing
13 Don t jailbreak or root it It is popular in some circles to circumvent the security controls on mobile devices in order to avoid paying for particular features or to enable capabilities that the carrier or vendor doesn t provide. This is called jailbreaking or rooting. Jailbreaking removes a layer of protection that helps keep malware from running on the device Jailbreaking is usually prohibited by mobile phone company contracts Jailbreaking is contrary to security best practices for those reasons Mobile Devices Using Without Losing
14 Sign up for "find my iphone It s available free on the itunes App Store. Of course you might have an Android phone there s an app for that. Lookout Mobile Security Premium for example. Mobile Devices Using Without Losing
15 Sign up for "find my iphone Allows you to: Display a message or make a sound Set a passcode lock remotely Remote wipe Display location on a map Mobile Devices Using Without Losing
16 Backups If it s an ios device, you can use itunes or icloud to back it up. Other devices have other backup mechanisms. If you have a good backup of your phone, and you lose it, you can do a remote wipe without having to worry about losing your contacts, photos, and other valuable information. It helps make doing the right thing easier. Mobile Devices Using Without Losing
17 Encryption If it s an ios device running recent software, merely setting a PIN or passcode will automatically encrypt the phone. If you have a good backup of your phone, and you lose it, you can do a remote wipe without having to worry about losing your contacts, photos, and other valuable information. It helps make doing the right thing easier. Mobile Devices Using Without Losing
18 What if you lose it? Next to the pictures of your loved ones, the most valuable things on your mobile device are probably your SUnetID and password If your device is lost or stolen, call the Help Desk at 5- HELP. They will assist in changing your SUnetID s password. Doesn t matter if you are in MDM or not, works even for Androids and other devices that MDM doesn t support yet. If you are enrolled in Stanford MDM, the Help Desk can lock it, wipe University data, and help you think through your options for trying to recover the device. Mobile Devices Using Without Losing
19 Mobile Device Management Stanford has a new service called Mobile Device Management It will set up your and calendar, and these security and privacy best practices for you Read about it at Mobile Devices Using Without Losing
20 Enrollment Walk-thru 1
21 Enrollment Walk-thru 2
22 Enrollment Walk-thru 3
23 Enrollment Walk-thru 4
24 Enrollment Walk-thru 5
25 Enrollment Walk-thru 6
26 Enrollment Walk-thru 7
27 Enrollment Walk-thru 8
28 Enrollment Walk-thru 9
29 Enrollment Walk-thru 10
30 Enrollment Walk-thru 11
31 Enrollment Walk-thru 12
32 Enrollment Walk-thru 13
33 Enrollment Walk-thru 14
34 Enrollment Walk-thru 15
35 Enrollment Walk-thru 16
36 Enrollment Walk-thru 17
37 Enrollment Walk-thru 18
38 Enrollment Walk-thru 19
39 Enrollment Walk-thru 20
40 Self-Management Interface 1
41 Self-Management Interface 2
42 Self-Management Interface 3
43 Self-Management Interface 4
44 Self-Management Interface 5
45 Self-Management Interface 6
46 Support Management Interface 1 $ remctl mdm1 mdm list-devices -u mkmellis fde2f92601f64fb48fb7847cf9599f58ec85ff8c mkmellis AT&T iphone4, c:d0:f8:4e:df:16 Mark K. Mellis's iphone $
47 Support Management Interface 2 $ remctl mdm1 mdm show-device fde2f92601f64fb48fb7847cf9599f58ec85ff8c Device 1 of 1: DB id: 3158 UDID: fde2f92601f64fb48fb7847cf9599f58ec85ff8c Device Name: Mark K. Mellis's iphone User Name: mkmellis Model: iphone 4S Last Check-in: :03:09 OS Version: ios (9A405) Cert Expires: :02:18 WiFi Mac Address: 3c:d0:f8:4e:df:16 [continued]
48 Support Management Interface 3 [continued] Phone Number: Cellular Technology: GSM Cellular NetworkId: Sim Carrier: AT&T Last Carrier: Serial Number: C39GPJ9QDT9V Carrier Settings Version: 11.0 Modem Firmware Version: Capacity (GB): Last Updated: :02:42 Profiles Installed: MDM Regular [v ] ActiveSync [v ] Cisco VPN [v ] $
49 Support Management Interface 3 $ remctl mdm1 mdm show-apps fde2f92601f64fb48fb7847cf9599f58ec85ff8c Applications Installed: AirPort(100.14) BayAreaNews(1.02) BodyMedia(2413) Calc 16C(1.1.0) [ ] Yelp(5.5.1) Z-Subsonic(2.8) $
50 Here s what you do 1. Review these tips (and more) at mobile 2. Put them into practice today! 3. Enroll in Mobile Device Management at Mobile Devices Using Without Losing
51 Questions? Mark K. Mellis Mobile Devices Using Without Losing
Security for the Road Warrior
Security for the Road Warrior Mark K. Mellis Associate Information Security Officer Stanford University Information Security Office Version 1.1 We are all mobile We all travel from home to campus or from
More informationDeploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
More informationipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
More informationiphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
More informationSmart Ideas for Smartphone Security
Page 1 of 6 8814 Fargo Road, Suite 105 Richmond, Virginia 804.360.4490 www.seltekinc.com July 2013 Computer Forensics IT Support Security ediscovery Security Apps for your Smartphone Smart Ideas for Smartphone
More informationManaging ios Devices. Andrew Wellington Division of Information The Australian National University XW11
Managing ios Devices Andrew Wellington Division of Information The Australian National University About Me Mac OS X Systems Administrator Division of Information (Central IT) Mostly manage servers (about
More informationios 7.0.6 W HY YOU NEED TO UPGRADE Presented by Ammy Woodbury AND HOW TO GET THE MOST FROM I OS 7
ios 7.0.6 W HY YOU NEED TO UPGRADE AND HOW TO GET THE MOST FROM I OS 7 Presented by Ammy Woodbury Today s Plan What went wrong Tips to ease the transition to ios 7 What s New in ios 7 My favorite ios tips
More informationSpring Hill State Bank Mobile Banking FAQs
Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an
More informationLabTech Mobile Device Management Overview
You are here: Using LabTech > Mobile Device Management > Mobile Device Management Overview LabTech Mobile Device Management Overview Features LabTech mobile device management (MDM) is a fully integrated
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationApple Configurator MDM Site - Review
Management Options ios New Market ipads - January 2010 Several changes in a short period of time. Apple Lion Server came out June 2011. Apple Configurator came out in June 2012. Why Absolute or Alteris?
More information{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
More informationDeploying iphone and ipad Apple Configurator
Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions
More informationDeploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
More informationONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
More informationMobile Security: Controlling Growing Threats with Mobile Device Management
Mobile Security: Controlling Growing Threats with Mobile Device Management As the use of mobile devices continues to grow, so do mobile security threats. Most people use their mobile devices for both work
More informationWhy you need. McAfee. Multi Acess PARTNER SERVICES
Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices
More informationAPPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
More informationMobile Operating Systems & Security
Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationMobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationMobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
More informationAbsolute Manage MDM. John Wu Systems Engineer jcwu@absolute.com
Absolute Manage MDM John Wu Systems Engineer jcwu@absolute.com Saving Time and Money Comprehensive IT Automation Patch Management Software Distribution Software License Management Power Management Asset
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More informationThe Risks and Rewards of Social Media and Mobile Devices
The Risks and Rewards of Social Media and Mobile Devices October 29-30, 2012 Tony Brooks, CISA Principal & Director of IT Assurance Tony and Brooks, Risk Services CISA, CRISC Partner HORNE - IT LLP Assurance
More informationGuidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
More informationNorton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
More informationBYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com
More informationSecuring Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
More informationKaseya 2. User Guide. Version 7.0. English
Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationGood for Enterprise Good Dynamics
Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity
More informationApple Deployment Programs Apple ID for Students: Parent Guide
Apple Deployment Programs Apple ID for Students: Parent Guide As a parent or guardian, you want the best learning environment for your student. One that makes learning relevant for each student and allows
More informationAirWatch for Android Devices
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationInformation Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
More informationiphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
More informationMobile Security BYOD and Consumer Apps
Mobile Security BYOD and Consumer Apps Adam Shnider, Managing Director, Coalfire October 16, 2012 Agenda I. The Mobile World - Trends I. Mobile devices - threats and risks I. BYOD Security Top Five I.
More informationBYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
More informationBYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
More informationUser Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual
User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...
More informationTechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security
Enterprise Mobility - Mobile Device Security Story Context: TechnoLabs has been focusing and offers Enterprise Mobility as one of its solution offering. No can deny the fact that mobile computing can bring
More informationNetSafe Smartphone Security Report 2014
NetSafe Smartphone Security Report 2014 Smartphone Security Report 2014 Smartphone Security Advice 1. Lock your smartphone Use a pin, password, complex swipe or other option to restrict access to your
More informationMS ipad Acceptable Use Policy (AUP) 2015-2016
Introduction Monte Vista provides network and technology resources to enrich the academic experience of students, faculty and staff. Our 1:1 ipad program is a natural extension of our mission to be a premiere
More informationThe Incident Response Playbook for Android and ios
SESSION ID: AIR-W03R The Incident Response Playbook for Android and ios Andrew Hoog CEO and Co-founder NowSecure @ahoog42 @NowSecureMobile Andrew Hoog Author of three books Incident Response for Android
More informationSecurity and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com
More informationFrequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are
More informationGlobal Mobile Technologies Guide for Zenprise Enrollment for IOS devices (ipad, iphones)
Global Mobile Technologies Guide for Zenprise Enrollment for IOS devices (ipad, iphones) As part of Sony Pictures commitment to enabling our workforce with the best technology and related tools available,
More informationCOMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
More informationMobile Banking Questions and Answers
Mobile Banking Questions and Answers How much does this service cost? There is currently no charge associated with the service. However, there may be charges associated with text messaging and data usage
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationData Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
More informationFaculty & Staff: Office 365 Email Migration
Faculty & Staff: Office 365 Email Migration Over the next few months, Berry College faculty and staff email accounts will be migrated to Office 365. This means that all of our emails are being moved to
More informationManageEngine Desktop Central. Mobile Device Management User Guide
ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...
More informationSECURE AND MANAGE YOUR MOBILE FLEET Freedome for Business
SECURE AND MANAGE YOUR MOBILE FLEET Freedome for Business TAKE CONTROL OF MOBILE SECURITY In the age of mobile work, safeguarding the network perimeter is not easy. Poorly protected smartphones are now
More informationFAQ for ipad (ios 5.x)
FAQ for ipad (ios 5.x) Content: 1. Connecting to CityU Wireless Local Area Network (CityU WLAN) 2. Setting up the Microsoft Exchange account (for staff only) 3. Setting up the Office365 Exchange online
More informationHealthcare Buyers Guide: Mobile Device Management
Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
More informationQuick Start Guide. Version R9. English
Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationFeature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Mobile Mobile OS Platform Phone 8 Symbian Android ios General MDM settings: Send SMS *(1 MOZO client settings (Configure synchronization
More informationAirWatch for ios Devices
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides
More informationStudents Mobile Messaging Registration & Configuration
Rutgers Biomedical and Health Sciences (RBHS) has implemented security controls to be applied to all mobile devices (Smart Phones and tablets) that contain RBHS (NJMS) email. These controls have been established
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationBring Your Own Device Policy
Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be
More informationEnd User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
More informationHow to wipe personal data and email from a lost or stolen mobile device
IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or
More informationcompany policies are adhered to and all parties (traders,
APPLICATION SECURITY OVERVIEW Users have access to additional layers of security that are controlled and determined by the company s ICE administrator. These are designed to ensure company policies are
More informationiphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
More informationMobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
More information1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5
User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation
More informationHow To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device
Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee
More informationMobile Device Management ios Policies
Mobile Device Management ios Policies Introduction ios policies allow administrators to use mobile device management features of CentraStage and push them, over the air (OTA), to ios devices (in other
More informationENTERPRISE SECURITY. ios Security Lecture 5 COMPSCI 702
ENTERPRISE SECURITY ios Security Lecture 5 COMPSCI 702 APPLE BUSINESS Apple s ios-based devices have gained popularity among consumers 61.2 million handsets sold in Q1 (2015) More enterprises have started
More informationResearch Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
More information10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
More informationEnterprise Security with mobilecho
Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come
More informationMobile Device Management AirWatch Enrolment ios Devices (ipad, iphone, ipod) Documentation - End User
Mobile Device Management AirWatch Enrolment ios Devices (ipad, iphone, ipod) Documentation - End User Version 1.0 Contents Definitions... 1 Expected Time Taken to complete... 1 What do I need or need to
More informationManaging and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
More informationCan I transfer money to accounts I have at other Financial Institutions through Mobile Banking? No, we don t currently offer this service.
Mobile Banking Questions and Answers How much does this service cost? There is currently no charge associated with the service. However, there may be charges associated with text messaging and data usage
More informationAndroid vs. Apple ios Security Showdown Tom Eston
Android vs. Apple ios Security Showdown Tom Eston About Your Presenter Tom Eston CISSP, GWAPT Manger of the SecureState Profiling & Penetration Team Specializing in Attack & Penetration, Mobile Security
More informationNortheast Bank Mobile Deposit Service FAQ
Northeast Bank Mobile Deposit Service FAQ What is Northeast Bank Mobile Deposit? What items can be deposited via Northeast Bank Mobile Deposit service? What items cannot be deposited through Northeast
More informationAPPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES
APPLE & BUSINESS ios ENTERPRISE SECURITY Apple have had an uphill battle getting into businesses for many years the Windows monopoly Phones provided another attempt Blackberrys and Windows Mobile were
More informationWashwood Heath Academy Use by staff of private communication devices policy
As a learning community, Washwood Heath Academy wants all staff and students to be able to be safe users of ICT and all data storage. The development of responsible, independent users is a prime aim of
More informationHands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl
More informationipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
More informationios Education Deployment Overview
ios Education Deployment Overview ipad brings an amazing set of tools to the classroom. Teachers can easily customize lessons with interactive textbooks, rich media, and online courses. And students stay
More informationMobile Security: Threats and Countermeasures
Mobile Security: Threats and Countermeasures Introduction Mobile devices are rapidly becoming the primary end-user computing platform in enterprises. The intuitive user-experience, robust computing capabilities,
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationSpecial Report. Choosing the right mobile device platform for your business
Special Report Choosing the right mobile device platform for your business About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation
More informationTwo Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
More informationMobile Tablet Devices
Document Owner: Page 1 of 5 Mobile Tablet Devices Purpose The purpose of this document is to provide guidance for the appropriate purchase and usage of Mobile Tablet Devices (devices running ios and Android
More informationMobile Security Standard
Mobile Security Standard Title Mobile Security Standard Mobile Device Security Category Version: 18/07/2013 PUBLISHED Author:, IT Services Contact: itsecurity@contacts.bham.ac.uk Mobile Security Standard
More informationTHE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers. December 13, 2012 Telephone Seminar/Audio Webcast
1 THE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers Cosponsored with the ABA Law Practice Management Section December 13, 2012 Telephone Seminar/Audio Webcast Android Apps
More informationKaseya 2. User Guide. Version 1.0
Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
More information