...Some people / organizations will be a target REGARDLESS of what they do, but most will be a target / victim BECAUSE of what they do

Size: px
Start display at page:

Download "...Some people / organizations will be a target REGARDLESS of what they do, but most will be a target / victim BECAUSE of what they do"

Transcription

1

2 ...Some people / organizations will be a target REGARDLESS of what they do, but most will be a target / victim BECAUSE of what they do (2013 DATA BREACH INVESTIGATIONS REPORT p.1)

3 MOBILE D EVICE S AFETY & SECURITY PHYSICAL SAFETY Securing yourself and your devices from physical harm DATA SECURITY Securing the information within your devices COMMUNICATIONS SECURITY Securing the methods used to transmit information to/from your devices FINANCIAL SECURITY Securing the way you access financial data and Mobile Payments WHEN IT ALL GOES WRONG Securing yourself against Theft or Loss and preparing for Replacement or Upgrade

4 P HYSICAL S AFETY PROTECT YOUR DEVICE Case / Bumper Screen Protector PROTECT YOURSELF Be aware of surroundings - Minimize opportunity for theft Minimize use while walking / biking / driving Use mount or partner, not cupholder or handheld Minimize depth of field changes & fumbling USE BUILT IN PROTECTION Always lock with code / biometrics - 0.1% chance of random unlock Activate Find My Device features

5 SECURING YOUR D ATA - 1 IOS 8 & ANDROID 5.0 (LOLLIPOP) Full device encryption built in as long as device is locked - Apple / Google do NOT keep key. If no code is used, Device can be reset by anyone. Use it or Lose it CLOUD STORAGE Dropbox / icloud / Google Drive / One Drive Used to sync data between all devices & PC s Protected by passwords No history of data theft but there have been hiccups CLOUD SERVICES imessage and 3rd party apps feature end to end encryption is not mastered on Devices but stored and managed by the provider IoT - Home security and connected devices cannot be considered secure. Industry too young and focused on $$$, not security (Exception: HomeKit)

6 SECURING YOUR D ATA - 2 APP SECURITY Reputable Apps from Reputable Sources: Apple App Store / Google Play Check Publisher s name Search web using App name and malware Read reviews (and write them!) Permissions: Logical & Necessary? Common overreach: SMS, Location, Camera / Mic / Pics, Contacts / Calendar / Social Accounts Paid vs. Free - Are you the client or the product? App Malware - Prevalent for Android, minimal for Apple Health Data / Emergency Info - Yellow Dot equivalent

7 S ECURING YOUR COMMUNICATION - 1 RADIOS Cellular (4G LTE) Encrypted end to end - considered secure WiFi May / may not be locked with passcode required Assume INSECURE unless you set it up yourself Bluetooth New LE standard allows constant monitoring and transmissions Used by Headsets and Speakers; Primarily for voice & music, rarely Data Required for Apple AirDrop (Files / Pics) Considered secure due to limited range and use NFC / Peer to Peer Devices must be very close to one another (~6 ) Used for Android File Transfers, Pay

8 S ECURING YOUR COMMUNICATION - 2 VPN (VIRTUAL PRIVATE NETWORKS) Creates a virtual straw within the Wifi / Ethernet pipes Cannot be sniffed over network Encrypted end to end - considered secure Allows use of public WiFi for protected data / information PIGGYBACKED DATA Some information is broadcast continuously Cellular enabled devices are always looking for strongest signal Location is therefore tracked and may be stored Check Privacy setting on device to understand and limit exposure

9 FINANCIAL SECURITY - 1 ACCESS TO BANKING / INVESTMENTS / PORTFOLIOS Via Web - Direct to providers website using Browser (Safari / Chrome) Via App - Direct to provider using their custom designed interface Via Service - Accessed thru web service like Google / Yahoo / AOL Protected by Institutional or Service passwords. BANKING ALERTS Each Bank can be configured to notify you when a user defined event occurs Via Text / SMS / imessage Via Configure individual accounts for different alerts / thresholds

10 FINANCIAL SECURITY - 2 MOBILE WALLET Pay / Google Wallet / SoftCard / MCX Device is authorized and unique ID# is assigned to Secure Element For each transaction, a one-time code is generated on device and used to interface with payment terminal via NFC Merchant does not receive actual CC number, Payment is reconciled by Banks in < 1sec If Merchant is hacked, thief finds 1x code that is useless. Prevents another Home Depot / Target / etc Apple does NOT keep any records of transactions. Google DOES keep track of all purchases, locations, values, spending habits, etc Requires hardware / software combo. Many Android 4.4+ (KitKat) and all iphones with ios 8.1 AND fingerprint scanner (iphone 5S requires Watch)

11 MOBILE D EVICE S AFETY PREPARING FOR D ISASTER Device Backup Why? Don s Story idevices Automatic thru itunes over WiFi or USB Android OEM Built-in 3rd Party App Result: Lost, broken, or new devices can be restored easily.

12 *BEST P RACTICES * - PHYSICAL, DATA, AND COMMUNICATIONS PHYSICAL DATA SECURITY Use Cloud storage and services at your own risk; Use strong, unique passwords Purchase Apps from known curated stores ( App Store / Google Play) Android - Be vigilant! Many apps are malware. Check App s permissions and only allow what is logical and necessary If you're not the Client, then you're the Product. Peace of mind and privacy are worth the nominal costs. COMMUNICATION METHODS Be aware of your surroundings, protect yourself and your devices Keep devices locked and know how to use find my device features 4G / Cellular = Secure WiFi networks are INSECURE unless you personally set it up. COMMUNICATION SECURITY VPN s allow secure use of any WiFi. Available through subscription Be aware of what your devices are communication on a regular basis. Are they broadcasting Location? Anything else?

13 *BEST PRACTICES * - MOBILE BANKING, PAYMENTS, AND B ACKUP BANK / INVESTMENT SECURITY MOBILE PAYMENTS Access your banking and investments through the web or custom Apps authored by the institutions themselves only. Do NOT use 3rd party apps. Have a strong, unique password for each website / institution. Set up Alerts to monitor financial activity in real time. Mobile Banking can be secure if communication method is Cellular (4G), known secure WiFi, or VPN on any WiFi. If you meet the hardware/software requirements, Mobile Payments are MORE secure than traditional credit cards If you don t have devices that will work, look for these features in your next device as mobile payments will become more popular and accepted in the future. DISASTER PREVENTION & UPGRADE PLANNING Set up and follow plan for Backing up data to Cloud and your computer Use Built-in / recommended software automate the process

14 THANK YOU!

15

Mobile Device Management ios Policies

Mobile Device Management ios Policies Mobile Device Management ios Policies Introduction ios policies allow administrators to use mobile device management features of CentraStage and push them, over the air (OTA), to ios devices (in other

More information

Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com

Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com We secure your information world www. Mobile Security Features What are the new security features in Android KitKat 4.4 and IOS 7?. IOS Feature 1 Single Sign-on Previously available for multiple apps developed

More information

Apple Deployment Programs Apple ID for Students: Parent Guide

Apple Deployment Programs Apple ID for Students: Parent Guide Apple Deployment Programs Apple ID for Students: Parent Guide As a parent or guardian, you want the best learning environment for your student. One that makes learning relevant for each student and allows

More information

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 What are You Trying to Protect? If someone got into your email, what

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

1. Set a longer (and stronger) six-digit passcode. 2. Prevent apps from uploading your data

1. Set a longer (and stronger) six-digit passcode. 2. Prevent apps from uploading your data For Privacy and Security Change ios 9 Settings Immediately by Zack Whittaker ZDNet Security September 16, 2015 Source: http://www.zdnet.com/pictures/iphone-ipad-ios-9-privacy-security-settings-immediately/

More information

Managing Mobility. 10 top tips for Enterprise Mobility Management

Managing Mobility. 10 top tips for Enterprise Mobility Management Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind

More information

Securing your credit *

Securing your credit * CYBER SAFETY Securing your credit * In the United States, your identity and credit history can be used to secure loans and insurance policies, to gain employment, and to open credit cards. With so much

More information

Deploying iphone and ipad Mobile Device Management

Deploying iphone and ipad Mobile Device Management Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.

More information

NHSmail mobile configuration guide Apple iphone

NHSmail mobile configuration guide Apple iphone Only the Apple iphone 3GS and iphone 4 support encryption at rest. The iphone 3G and iphone 2G will not connect to NHSmail NHSmail mobile configuration guide Apple iphone Version: V.6 Date: November 2011

More information

Students Mobile Messaging Registration & Configuration

Students Mobile Messaging Registration & Configuration Rutgers Biomedical and Health Sciences (RBHS) has implemented security controls to be applied to all mobile devices (Smart Phones and tablets) that contain RBHS (NJMS) email. These controls have been established

More information

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]

More information

Spring Hill State Bank Mobile Banking FAQs

Spring Hill State Bank Mobile Banking FAQs Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an

More information

LabTech Mobile Device Management Overview

LabTech Mobile Device Management Overview You are here: Using LabTech > Mobile Device Management > Mobile Device Management Overview LabTech Mobile Device Management Overview Features LabTech mobile device management (MDM) is a fully integrated

More information

iphone in Business Mobile Device Management

iphone in Business Mobile Device Management 19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device

More information

In the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org

In the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org In the Cloud Scoville Memorial Library February, 2013 ccayne@biblio.org What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the

More information

Mobile Operating Systems & Security

Mobile Operating Systems & Security Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens

More information

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner johannes.feichtner@iaik.tugraz.at IAIK

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner johannes.feichtner@iaik.tugraz.at IAIK Motivation 2 Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at What you have heard last time Mobile devices: Short history, features Technical evolution, major OS,

More information

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com {ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling

More information

ios How to Back Up from icloud

ios How to Back Up from icloud ios How to Back Up from icloud How to back up from icloud icloud automatically backs up the most important data on your device using ios 5 or later. After you have enabled Backup on your iphone, ipad,

More information

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time. SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support

More information

Mobile Security: Controlling Growing Threats with Mobile Device Management

Mobile Security: Controlling Growing Threats with Mobile Device Management Mobile Security: Controlling Growing Threats with Mobile Device Management As the use of mobile devices continues to grow, so do mobile security threats. Most people use their mobile devices for both work

More information

ipad Deployment Guide

ipad Deployment Guide ipad Deployment Guide Prepared by Taaleem Central Office ITSS ipad Deployment Guide Deployment Considerations Wi-Fi and Networking The network infrastructure must set up to work correctly with Bonjour,

More information

Backing up your digital image collection provides it with essential protection.

Backing up your digital image collection provides it with essential protection. Backing up your digital image collection provides it with essential protection. In this chapter, you ll learn more about your options for creating a reliable backup of your entire digital image library.

More information

2015 MDRT Annual Meeting e Handout Material. What is Your Smartphone Leaking?

2015 MDRT Annual Meeting e Handout Material. What is Your Smartphone Leaking? 2015 MDRT Annual Meeting e Handout Material Title: Speaker: What is Your Smartphone Leaking? Anwar Visram, CISSP Presentation Date: Wednesday, June 17, 2015 10:00 11:00 a.m. The Million Dollar Round Table

More information

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%

More information

1. You will have knowledge of all the features of Yosemite and ios 8 that allow employees and business owners to collaborate on their work.

1. You will have knowledge of all the features of Yosemite and ios 8 that allow employees and business owners to collaborate on their work. Collaboration Collaboration simply means to work together and that is exactly what Yosemite and ios 8 do for individuals and organisations. Quite often organisations face challenges around how to get technology,

More information

A Guide For Reviewers. A Guide For Reviewers

A Guide For Reviewers. A Guide For Reviewers Table Of Contents WELCOME TO PASSWORD BOSS!.... 2 PASSWORD BOSS: A SMARTER WAY TO STAY SECURE ONLINE....3 HOW PASSWORD BOSS PROTECTS YOUR SECURITY AND PRIVACY.... 5 INSTALLING PASSWORD BOSS AND CREATING

More information

How to wipe personal data and email from a lost or stolen mobile device

How to wipe personal data and email from a lost or stolen mobile device IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or

More information

Data Loss Prevention & Mobile Device Management

Data Loss Prevention & Mobile Device Management Data Loss Prevention & Suitable for any network size and any industry DLP for Windows, Mac and Linux Protecting the entire network Out-of-the-Box Solution to secure sensitive data from threats posed by

More information

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...

More information

Quick Start Guide. Version R9. English

Quick Start Guide. Version R9. English Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

itunes: About ios backups

itunes: About ios backups itunes: About ios backups itunes can back up your settings, Messages, Camera Roll, documents, saved games, and other data. Backups don't contain content synced to the device, such as movies, music, podcasts,

More information

Smart Ideas for Smartphone Security

Smart Ideas for Smartphone Security Page 1 of 6 8814 Fargo Road, Suite 105 Richmond, Virginia 804.360.4490 www.seltekinc.com July 2013 Computer Forensics IT Support Security ediscovery Security Apps for your Smartphone Smart Ideas for Smartphone

More information

Windows Phone 8.1 Mobile Device Management Overview

Windows Phone 8.1 Mobile Device Management Overview Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are

More information

GROUPTALK FOR ANDROID VERSION 3.0.0. for Android

GROUPTALK FOR ANDROID VERSION 3.0.0. for Android for Android Requirements Android version 2.3 or later. Wi-Fi or mobile data connection of at least 20kbit/s network bandwidth. Optional: Bluetooth audio requires Android version 4.0.3 or later. Optional:

More information

Mobile Device Management (MDM) Policies

Mobile Device Management (MDM) Policies Mobile Device Management (MDM) Policies Best Practices Guide Copyright 2012 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice.

More information

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5 User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation

More information

FINAL DRAFT. APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE. Version 1, Release 0.1.

FINAL DRAFT. APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE. Version 1, Release 0.1. FINAL DRAFT APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE Version 1, Release 0.1 18 September 2015 Developed by Apple and for the DoD LIST OF TABLES Page Table 1: Non-Supervised

More information

Mobile Device Management (MDM) Policies. Best Practices Guide. www.maas360.com

Mobile Device Management (MDM) Policies. Best Practices Guide. www.maas360.com Mobile Device Management (MDM) Policies Best Practices Guide www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential

More information

Introduction to AirWatch and Configurator

Introduction to AirWatch and Configurator Introduction to AirWatch and Configurator Overview AirWatch integrates seamlessly with Apple Configurator to enable IT administrators to effectively deploy and manage Apple ios devices. Deploying a large

More information

ipad in Business Mobile Device Management

ipad in Business Mobile Device Management ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management

More information

Basic Computer Security Part 3

Basic Computer Security Part 3 Basic Computer Security Part 3 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Helpdesk Contact Information

Helpdesk Contact Information Helpdesk Contact Information Help Desk Contact Info: 215-4111 Option 1 ELP.Helpdesk@ttuhsc.edu Support Hours: Monday Friday 7:00am 6:00pm Help Desk locations: CSB Room C243 MEB - Room 2160 Submit a ticket:

More information

Tutorial on Smartphone Security

Tutorial on Smartphone Security Tutorial on Smartphone Security Wenliang (Kevin) Du Professor wedu@syr.edu Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

Connecting your Aiki phone to a network

Connecting your Aiki phone to a network Connecting your Aiki phone to a network Connect to mobile networks Depending on your carrier and service plan, your phone may connect automatically to your carrier s fastest available data network. Or

More information

Are free Android virus scanners any good?

Are free Android virus scanners any good? Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

Deploying iphone and ipad Apple Configurator

Deploying iphone and ipad Apple Configurator Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions

More information

award winning devices and solutions for business

award winning devices and solutions for business award winning devices and solutions for business welcome to HTCpro HTCpro is an established programme designed for business that delivers a comprehensive suite of enterprise-grade mobile solutions. These

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Pryvate App User Manual

Pryvate App User Manual Pryvate App User Manual 2.0 Powered by Criptyque Pryvate is the most secure voice, email & chat app for business people & individuals that require a high level of communications encryption to protect their

More information

PROFESSIONAL DIGITAL TWO-WAY RADIO MOTOTRBO ANYWHERE. for ios USER GUIDE

PROFESSIONAL DIGITAL TWO-WAY RADIO MOTOTRBO ANYWHERE. for ios USER GUIDE PROFESSIONAL DIGITAL TWO-WAY RADIO MOTOTRBO ANYWHERE for ios USER GUIDE MOTOROLA, MOTO, MOTOROLA SOLUTIONS, MOTOTRBO and the Stylized M logo are trademarks or registered trademarks of Motorola Trademark

More information

Mobile Learning Apps. Distance Learning mxccdistance@mxcc.edu (860) 343 5756 Founders 131/131A Middlesex Community College http://mxcc.

Mobile Learning Apps. Distance Learning mxccdistance@mxcc.edu (860) 343 5756 Founders 131/131A Middlesex Community College http://mxcc. Mobile Learning Apps Distance Learning mxccdistance@mxcc.edu (860) 343 5756 Founders 131/131A Middlesex Community College http://mxcc.edu/ett 4/10/2014 Mobile Learning Basics Basics in Mobile Devices Settings

More information

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices 8-27-2015 4-007.1 Supersedes 4-007 Page Of 1 5 Responsible Authority Vice Provost for Information

More information

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee

More information

Kaspersky Security for Mobile Administrator's Guide

Kaspersky Security for Mobile Administrator's Guide Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that

More information

Apple Configurator MDM Site - Review

Apple Configurator MDM Site - Review Management Options ios New Market ipads - January 2010 Several changes in a short period of time. Apple Lion Server came out June 2011. Apple Configurator came out in June 2012. Why Absolute or Alteris?

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool

More information

Protect Yourself from Cyber Risks

Protect Yourself from Cyber Risks Protect Yourself from Cyber Risks 2012 SEAS Cybersecurity Awareness Day 10/17/12 Jay Carter, CISSP CISA Agenda Overview Notable Targets of Hackers What You Can Do to Protect Yourself Identity Theft Questions

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

Mobile Security & BYOD Policy

Mobile Security & BYOD Policy Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers

More information

A 10 MINUTE OVERVIEW OF KEY FEATURES FOR EVENT MOBILE APPS.

A 10 MINUTE OVERVIEW OF KEY FEATURES FOR EVENT MOBILE APPS. A 10 MINUTE OVERVIEW OF KEY FEATURES FOR EVENT MOBILE APPS. There has been an explosion of Mobile Apps for Events and Conferences in the last few years. The demand from the Event planners, from the Attendees

More information

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11 Managing ios Devices Andrew Wellington Division of Information The Australian National University About Me Mac OS X Systems Administrator Division of Information (Central IT) Mostly manage servers (about

More information

Security for the Road Warrior

Security for the Road Warrior Security for the Road Warrior Mark K. Mellis Associate Information Security Officer Stanford University Information Security Office Version 1.1 We are all mobile We all travel from home to campus or from

More information

Reviewer Guide Core Functionality

Reviewer Guide Core Functionality securing your personal data Sticky Password Reviewer Guide Core Functionality Sticky Password is the password manager for the entire lifecycle of your passwords. Strong passwords the built-in password

More information

Fromdistance MDM Feature Sets. Symbian^3 & S60. Windows Mobile

Fromdistance MDM Feature Sets. Symbian^3 & S60. Windows Mobile PC Client version 2.11.10 2.10 2.0.0 2.0.0 2.0.10 1.71 Inventory IMEI IMSI 1 Roaming status Battery status Firmware Hardware Manufacturer Language Free space of device memory Free space of removable media

More information

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE 2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly

More information

Mobile Devices Using Without Losing

Mobile Devices Using Without Losing Mobile Devices Using Without Losing Mark K. Mellis Associate Information Security Officer Stanford University Information Security Office Tech Briefing 30March 2012 We all have mobile devices iphones,

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

Country Club Bank- Intro to Mobile Banking- Android & iphone Apps

Country Club Bank- Intro to Mobile Banking- Android & iphone Apps Country Club Bank- Intro to Mobile Banking- Android & iphone Apps MOBILE APP BANKING (FOR IPHONE AND ANDROID)... 2 SIGN ON PAGE... 4 ACCOUNT SUMMARY PAGE... 4 ACCOUNT ACTIVITY PAGE... 6 SEARCH ACTIVITY

More information

Apple in the Enterprise

Apple in the Enterprise Apple in the Enterprise New iphones, Wearables, ios 8 Josh Lambert Chris Corbet Today The Biggest Advancement in the History of iphone iphone 6, iphone 6 Plus Watch ios 8 Pay ios 8 in the Enterprise 2

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

Hello. Quick Start Guide

Hello. Quick Start Guide Hello. Quick Start Guide Welcome to your new Mac mini. Let us show you around. This guide shows you what s on your Mac, helps you set it up, and gets you up and running with tips for the apps you ll use

More information

Apple Pay & The New Environment for Mobile Payment Apps

Apple Pay & The New Environment for Mobile Payment Apps Apple Pay & The New Environment for Mobile Payment Apps Events, Timing & Methodology I SEPT 9 Apple Press Conference SEPT 18 2104 CPM Data Collection SEPT 25 iphone6 In-Stores Consumer Payments Monitor

More information

Business ebanking - User Sign On & Set Up

Business ebanking - User Sign On & Set Up About Sign On Business ebanking has two authentication methods that reduce the risk of online identity theft: secure token authentication and out-of-band authentication. The authentication method companies

More information

Understanding Security Threats in the Cyber World. Beth Chancellor, Chief Information Security Officer

Understanding Security Threats in the Cyber World. Beth Chancellor, Chief Information Security Officer Understanding Security Threats in the Cyber World Beth Chancellor, Chief Information Security Officer Agenda Phishing Credit Card Fraud & Identity Theft Cloud Services Social Networking Wireless Phishing

More information

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple

More information

Policy and Profile Reference Guide. BES10 Cloud Market Preview

Policy and Profile Reference Guide. BES10 Cloud Market Preview Policy and Profile Reference Guide BES10 Cloud Market Preview Published: 2014-02-04 SWD-20140204170848330 Contents About this guide... 13 What is BES10 Cloud?... 13 Key features of BES10 Cloud...14 IT

More information

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011 Sophos Mobile Control User guide for Apple ios Product version: 2 Document date: December 2011 Contents 1 About Sophos Mobile Control... 3 2 Set up Sophos Mobile Control on an Apple iphone... 4 3 Set up

More information

imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2

imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2 imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2 Owner: Cynthia Tan IT Services Table of Contents GENERAL FAQS... 4 1. How to access to Sunway imail account?... 4 2. I can t login to my

More information

ipad Set Up Guide: Staff! 1 of! 20

ipad Set Up Guide: Staff! 1 of! 20 ipad Set Up Guide: Staff! 1 of! 20 Follow the step-by-step directions in this document to activate your ipad; set up Lotus Notes Traveler; install and configure Google Chrome and Google Drive; and set

More information

FRAUD PROTECTION AND ONLINE SAFETY 2015 EDITION

FRAUD PROTECTION AND ONLINE SAFETY 2015 EDITION FRAUD PROTECTION AND ONLINE SAFETY 2015 EDITION 1 Table of Contents Mobile Device Settings Creating & Managing Passwords Phishing & Imposter Scams Healthcare, Charity, and Lottery Scams Identity Theft

More information

MDM Mobile Device Management

MDM Mobile Device Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

Mobile Security Lessons Learned from a Global Company. Jim Huddleston, CISSP, CISM, CIPP, CGEIT Director, Global IT Risk Management

Mobile Security Lessons Learned from a Global Company. Jim Huddleston, CISSP, CISM, CIPP, CGEIT Director, Global IT Risk Management Mobile Security Lessons Learned from a Global Company Jim Huddleston, CISSP, CISM, CIPP, CGEIT Director, Global IT Risk Management How much control do we need? What is the Business Case? What do we need

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

Keeping Data Safe. Patients, Research Subjects, and You

Keeping Data Safe. Patients, Research Subjects, and You Keeping Data Safe Patients, Research Subjects, and You How do hackers access a system Hackers Lurking in Vents and Soda Machines By NICOLE PERLROTH APRIL 7, 2014 New York Times SAN FRANCISCO They came

More information

Washwood Heath Academy Use by staff of private communication devices policy

Washwood Heath Academy Use by staff of private communication devices policy As a learning community, Washwood Heath Academy wants all staff and students to be able to be safe users of ICT and all data storage. The development of responsible, independent users is a prime aim of

More information

What is Bitdefender BOX?

What is Bitdefender BOX? Quick Setup Guide What is Bitdefender BOX? Think about Bitdefender BOX like an antivirus for your network. It s a hardware device that sits next to your Wi-Fi router and protects all Internet connected

More information

Names of Parts. English 1. Mic. Record Button. Status Indicator Micro SD Card Slot Speaker Micro USB Port Strap Hook

Names of Parts. English 1. Mic. Record Button. Status Indicator Micro SD Card Slot Speaker Micro USB Port Strap Hook User Manual Names of Parts Record Button Mic Status Indicator Micro SD Card Slot Speaker Micro USB Port Strap Hook Video Mode Photo Mode Local Mode Cloud Mode Mode Button Power Button Tripod Mount Clip

More information

GLOBALMEET FOR iphone. GLOBALMEET FOR iphone USER GUIDE

GLOBALMEET FOR iphone. GLOBALMEET FOR iphone USER GUIDE GLOBALMEET FOR iphone GLOBALMEET FOR iphone USER GUIDE Release 1.5 March 2014 TABLE OF CONTENTS GlobalMeet for iphone Overview 2 Installing GlobalMeet for iphone 3 Download the App 3 System Requirements

More information

Mobile Device Management Solution Hexnode MDM

Mobile Device Management Solution Hexnode MDM Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode

More information

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with

More information

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES APPLE & BUSINESS ios ENTERPRISE SECURITY Apple have had an uphill battle getting into businesses for many years the Windows monopoly Phones provided another attempt Blackberrys and Windows Mobile were

More information