Mobile Device Deployments-The Security Dangers of Technology on the Go
|
|
- Caitlin Hodge
- 8 years ago
- Views:
Transcription
1 Mobile Device Deployments-The Security Dangers of Technology on the Go Presented by Mark Bell, PMP, CISSP, CISA, CHSS OM03 Friday, 10/25/2013 3:45 PM - 5:00 PM
2 Mobile Device Deployments Is Your Organization More Empowered or Endangered? October 2013 Mark Bell EVP, Operations 2012 Digital Defense, Inc. Confidential Agenda About the Speaker About Digital Defense What is a Mobile Device? Mobile Device Usage In Employee Populations So Is It Really That Dangerous Out There? Protecting Your Company What Can You do to Manage the Risk? Public Use 2 1
3 About the Speaker Mark Bell, PMP, CISSP, CISA, CHSS Responsibilities include delivery of vulnerability assessments, penetration testing, Payment Card Industry (PCI) Approved Scanning Vendor (ASV) services, social engineering and risk assessments. Retired United States Air Force Former Senior Network Security Engineer with the 92nd Information Operations Squadron, Air Force Information Operations Center Master of Science degree in Information Assurance from Norwich University, Bachelor of Science in Computer Science from Hawaii Pacific University Certified as a Project Management Professional (PMP), Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified HIPAA Security Specialist (CHSS) Public Use 3 About Digital Defense Founded in 1999, Digital Defense, Inc., is the premier provider of managed security risk assessment solutions protecting billions in assets for small businesses to Fortune companies in over 65 countries. Verticals Served: Legal Financial Healthcare Railways Technology Public Use 4 2
4 What Is A Mobile Device? A mobile device (also known as a handheld device, handheld computer or simply handheld) is a pocketsized computing device, typically having a display screen with touch input and/or a miniature keyboard. Smartphones and PDAs are popular amongst those who require the assistance and convenience of certain aspects of a conventional computer, in environments where carrying one would not be practical. Source: Public Use 5 Examples of Mobile Devices Public Use 6 3
5 Examples of Mobile Devices Public Use 7 Mobile Device Usage In Employee Populations Public Use 8 4
6 Ownership Statistics As of May 2013: 91% of American adults have a cell phone 56% of American adults have a smartphone 28% of cell owners own an Android; 25% own an iphone; 4% own a Blackberry 34% of American adults own a tablet computer Source: Public Use 9 Home & Work Are Blending Source: _infographic_Mobile-User-is-Always-On_FINAL.jpg?download=1 Public Use 10 5
7 Mobile Device Usage On The Rise Source: Public Use 11 What Are Employees Using? Smartphones: The Go To Device Handheld Without Phone Netbook Tablet Feature Phone Desktop Laptop Smartphone 42% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Source: Public Use 12 6
8 Why Are They Using Mobile Devices? Nearly 60% of all consumers say it improves their productivity to take conference calls and use collaboration tools from their personal devices. Source: Public Use 13 BYOD: Employee View Let s Me Do My Job Better I Like The Flexibility Want A Single Phone For Work And Home Source: Public Use 14 7
9 Who Wants BYOD? Younger Workers Lead The Way! 45% 40% 42% 35% 30% 25% 20% 15% 10% 5% 0% Source: Public Use 15 The Greatest Driver for BYOD Everyone Wants Their NOW! Sales Force Automation Line of Business Apps Social Media Task & Project Management Office Applications Instant Messaging Calendar Contacts Web Browser 86% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Source: Public Use 16 8
10 So Is It Really That Dangerous Out There? Public Use 17 Yes It Is! Check Point 2013 Mobile Device Security Survey 79% of the respondents reported mobile security incidents in the past year 52% of large companies say cost of mobile security incidents last year exceeded $500,000 45% of businesses with less than 1000 employees reported mobile security incident costs exceeding $100,000 49% cite Android as platform with greatest perceived security risk (up from 30% last year), compared to Apple, Windows Mobile, and Blackberry 66% say careless employees greater security risk than cybercriminals Public Use 18 9
11 Bans Don t Work! BYOD alert: Confidential Data On Personal Devices Think you're safe if you have a policy prohibiting BYOD to begin with? Guess again. According to a Microsoft study, 67 percent of people use personal devices at work, regardless of the office's official BYOD policy -- so even if it's prohibited, there's a good chance employees (particularly millennials, who have a reputation for feeling entitled to more relaxed IT policies as a result of their college experiences -- are working with personal devices anyway. Source: Public Use 19 Where You re Exposed Device Loss/Theft Data Breach Malicious Applications Ownership Issues Public Use 20 10
12 Device Loss/Theft Users asleep on smartphone security and data loss. People who lose their smartphones at the pub may think the phone password can save them from embarrassment, but more often than not, they forget about the media or memory card, according to Ty Miller, chief technology officer at IT security consultancy Pure Hacking. "People don't really think about securing media cards on phones," Mr Miller said. "From a consumers' point of view, they just enjoy the storage of the media card." Why? It s just a phone. IT takes care of protecting my . It has a password on it. Source: Public Use 21 My Employees Are Careful! In the last six months alone, the nine-nation survey of leading taxi companies in Australia, Denmark, Finland, France, Germany, Norway, Sweden, Great Britain, and the U.S. indicated tens of thousands of digital devices were left behind inadvertently. The U.S. company polled in the survey, a major Chicago cab company, reported the highest number of losses per taxi of all firms studied, both in mobile phones (3.42 per cab) and PDAs/Pocket PCs (0.86 per cab). Based on the large size of the Chicago company's fleet, the statistics indicate a staggering 85,619 mobile phones, 21,460 PDAs/Pocket PCs, and 4,425 laptops left in the firm's licensed cabs during the six months covered in the study. Only London, with 0.21 laptop PCs lost per cab versus the Chicago firm's 0.18, was higher in any category. Source: CheckPoint Technologies Study Public Use 22 11
13 Data Breach Data breaches from mobile devices could lead to identity theft. Nearly 40% of organizations in the study had a data breach resulting from a lost or stolen mobile device, including tablet computers, smartphones and USB drives that contained confidential or sensitive data. Ponemon Institute Study Why? Users fail to understand the types of data stored on the device? Users are careless with the device. Remember, it s just a phone. Source: Public Use 23 Malicious Applications Malicious applications are exposing your company to risk. Symantec said 2012 saw a 58 percent increase in mobile malware families compared to Fifty nine percent of all mobile malware to-date was discovered in Symantec Internet Security Report It s my phone, I can load apps if I want! It was made by XYZ vendor, so it must be safe. Source: Public Use 24 12
14 Device Ownership Issues Wipeout: When Your Company Kills Your iphone A few weeks ago, Amanda Stanton's iphone suddenly went black. Everything was gone all her contacts, photos and even the phone's ability to make calls. Someone in the IT department had sent out what's called a "remote wipe," a kind of auto-destruct command that's delivered by . The wipe was done by mistake, and Stanton wouldn't have been surprised to see this kind of remote control on a company phone. But this iphone was hers. Why? Who really owns the phone? Who really owns the data on the phone? Source: Public Use 25 Protecting Your Company Public Use 26 13
15 What Most Companies Do Buy Technology Issue Policy To Staff Monitor Employees Public Use 27 What Companies Should Do Evaluate Risk Implement Policies & Procedures Buy Technology Public Use 28 14
16 But XYZ Said MDM Is All I Need! Gartner MDM Magic Quadrant 2012 With all of the MDM solutions available, how would you know which is right for you if you don t know what you are trying to protect? Public Use 29 Remember: MDM Is Not Foolproof Devices What if the solution doesn t support all of the models/makers that your staff is using? What if management wants iphones and staff wants Windows Mobile? App Stores How well does the MDM solution protect you against malicious apps / app stores? Does the solution allow you to have a corporate app store that contains only approved apps? Public Use 30 15
17 Start With A Risk Assessment Basic Questions That Need To Be Asked & Answered Why are we introducing the devices into our network? How are the devices connecting to the corporate network? What data will the devices have access to once introduced? What types of devices should we allow? Who should get access to corporate resources via a mobile device? What would our exposure be if a device was lost or stolen? Will all employees be able to participate? If not, why? Public Use 31 Let s Review One Item What Data Are You Trying To Protect? Client information How Are the Devices Connecting to the Corporate Network Putting Client Data At Risk? 3G/4G? What risks are they being exposed to by other users? Wireless? Will users be passing anything over the network in clear text? What happens if they multi-home their laptop with a mobile device hotspot? VPN? Not all VPNs work with all mobile devices. Multiple VPNs the answer? Will the VPN force the routing of personal traffic via the corporate network? OWA? Forces you to expose your Exchange Server to the Internet. You need to understand the risks of each before you can even think of writing your first policy. Public Use 32 16
18 What About Policies? Develop AFTER Your Risk Assessment! Address, at a Minimum Who furnishes the device? Is the employee reimbursed for any part of their phone or phone bill? (This can get VERY sticky!) Can the employee use the phone for personal use? Can the employee load applications from outside sources? If so, which? Who will decide? What should the employee do if the device is lost or stolen? What should IT do to protect the organization? Public Use 33 Example Policies App Store Usage Device Backup Joint Usage Policy (Personal/Corporate) Acceptable Use Media Card Usage Device Destruction & Replacement Lost & Stolen Devices Allowable Devices Use of Encryption Mobile Device Passwords Location Service Usage Overseas Travel with Mobile Devices Public Use 34 17
19 Protecting the Device Passwords & Patterns Most mobile devices support passwords, however some do not allow passwords that exceed four characters or passwords that meet corporate passwords standards. Many devices will allow the user to disable the password or change it to meet their needs (easier). Avoid swipe patterns (Android devices) as they can be easily compromised. Avoid facial and voice recognition technologies and they can be easily bypassed. Public Use 35 Protecting the Device Encryption (Device & Media) Most modern mobile devices support the encryption of user data on the device. Passwords PIN Some devices may not allow you to encrypt removable media (SD cards, etc.). If they are allowed this could be a potential risk. Some devices allow for encryption of certain data sets and as such may leave other more critical data unprotected. Public Use 36 18
20 Protecting the Device Firewalls Some devices are made available with built-in firewalls, some are not. Make sure you know which you are dealing with prior to deploying. Anti-Virus / Anti-Malware While still rare, mobile device anti-virus/antimalware packages are becoming more mainstream. Sophos and Lookout both offer packages for Android devices. Public Use 37 Recovery After Loss Remote Wiping Most devices will allow IT to remote wipe the device and erase all of the stored information, including data stored on removable storage. Ensure employees know that their data will be lost as well. Remote Discovery & Recovery Many devices now link to services that allow IT to remotely monitor the location of the device. Google and Apple both offer free services that, if allowed, make it easy to discover lost phones. Most MDM solutions have the same capabilities. Public Use 38 19
21 Protect Your Data Backups Make sure you are aware that employees may be backing up to icloud, Google Drive, Windows SkyDrive, or their own computer. These backups may contain very sensitive data that could be exposed to unauthorized persons. Make sure your MDM solution addresses this pre-deployment. Public Use 39 In Closing Mobile Devices can be a great asset to most organizations IF they are deployed in a consistent fashion. Think of mobile devices as just another type of personal computing device and protect them accordingly. Public Use 40 20
22 Questions? Follow Us On Twitter Like Us On Facebook Read Our Blog on Blogger Public Use 41 21
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationCyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
More informationThis session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
More informationNorth Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP
Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal
More informationCloud Backup and Recovery for Endpoint Devices
Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,
More information10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
More informationBYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
More informationManaging Mobile Device Security
Managing Mobile Device Security Kathy Downing, MA, RHIA, CHPS, PMP AHIMA Director Practice Excellence Objectives Understand how HIPAA and HITECH apply to mobile devices. Understand the oversight needed
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More informationMobile Medical Devices and BYOD: Latest Legal Threat for Providers
Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and
More informationA 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from
A 5-STEP PLAN TO PREPARE FOR BYOD IN HEALTHCARE A Complimentary White Paper from A 5-step plan to prepare for BYOD in health care A Complimentary White Paper from Healthcare Business & Technology Nearly
More informationSecurely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationBYOD and Your Business
BYOD and Your Business Learn about the BYOD trend, the risks associated with this trend, and how to successfully adopt BYOD while securing your network. Agenda The rise of BYOD Security risks associated
More informationMobile Security BYOD and Consumer Apps
Mobile Security BYOD and Consumer Apps Adam Shnider, Managing Director, Coalfire October 16, 2012 Agenda I. The Mobile World - Trends I. Mobile devices - threats and risks I. BYOD Security Top Five I.
More informationMobile Device Strategy
Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.
More informationHealthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service
Services > Overview MaaS360 Ensure Technical Safeguards for EPHI are Working Monitor firewalls, anti-virus packages, data encryption solutions, VPN clients and other security applications to ensure that
More information= AUDIO. The Importance of Mobile Device Management in HIT. An Important Reminder. Mission of OFMQ 12/9/2015
The Importance of Mobile Device Management in HIT Mario Cruz OFMQ Chief Information Officer An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906 0123. Step 2: Enter code 2071585#.
More informationSecurity for the Road Warrior
Security for the Road Warrior Mark K. Mellis Associate Information Security Officer Stanford University Information Security Office Version 1.1 We are all mobile We all travel from home to campus or from
More informationState of Mobility Survey. France Results
State of Mobility Survey France Results Methodology Survey performed by Applied Research 6,275 global organizations 43 countries NAM 2 LAM 14 EMEA 13 APJ 14 SMBs: Individuals in charge of computers Enterprises:
More informationEXECUTIVE SUMMARY Cloud Backup for Endpoint Devices
EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with
More informationWashwood Heath Academy Use by staff of private communication devices policy
As a learning community, Washwood Heath Academy wants all staff and students to be able to be safe users of ICT and all data storage. The development of responsible, independent users is a prime aim of
More information{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
More informationMobile Device Security
Mobile Device Security Presented by Kelly Wilson Manager of Information Security, LCF Research New Mexico Health Information Collaborative (NMHIC) and the New Mexico Health Information Technology Regional
More informationMobile Security: Controlling Growing Threats with Mobile Device Management
Mobile Security: Controlling Growing Threats with Mobile Device Management As the use of mobile devices continues to grow, so do mobile security threats. Most people use their mobile devices for both work
More informationMy CEO wants an ipad now what? Mobile Security for the Enterprise
My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager
More informationSecurity. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.
Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley
More informationTOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY An Inside Job Cyberthreats to your business are usually blamed on outsiders nefarious programmers writing malicious code designed to pilfer your
More informationDISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
More informationMobile Device Security Is there an app for that?
Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach
More informationSalmon Group, Inc. An 8(a) Certified, Veteran owned company
www.salmongroupinc.com info@salmongroupinc.com Main Office: 888.751.5551 Fax: 240.607.6712 About Us We are a: Maryland-based, Veteran Owned Corporation Certified participant of the SBA 8(a) and Small Disadvantaged
More informationData Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
More information[BRING YOUR OWN DEVICE POLICY]
2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2
More informationCyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
More informationHow To Manage Mobile Device Management In Healthcare
HIPAA! HITECH! HELP! Mobile Device Management (MDM) in Healthcare www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential
More informationIDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
More informationWHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
More information11 Best Practices for Mobile Device Management (MDM)
MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.
More informationYes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
More informationWhite Paper. Data Security. The Top Threat Facing Enterprises Today
White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is
More informationMobile Operating Systems & Security
Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens
More informationDeep Dive BYOD, COPE & MDM
Deep Dive BYOD, COPE & MDM Deep Dive BYOD, COPE and COD After the usage of BYOD has steadily been increasing, the COPE strategy might be the alternative to combine the advantages of BYOD and COD. COD COD
More informationThere are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.
There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business. We put this document together to help you understand
More informationWhy Email Encryption is Essential to the Safety of Your Business
Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations
More informationBYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com
More informationAdams County, Colorado
Colorado Independent Consultants Network, LLC Adams County, Colorado Bring-Your-Own-Device Policy Prepared by: Colorado Independent Consultants Network, LLC Denver, Colorado March 20, 2014 Table of Contents
More informationSmart Ideas for Smartphone Security
Page 1 of 6 8814 Fargo Road, Suite 105 Richmond, Virginia 804.360.4490 www.seltekinc.com July 2013 Computer Forensics IT Support Security ediscovery Security Apps for your Smartphone Smart Ideas for Smartphone
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationHIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates
HIPAA Myths WEDI Regional Affiliates Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the
More informationSecurity and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationBYOD BEST PRACTICES GUIDE
BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create
More informationBYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence
BYOD AND ME How cell phone hacking effects your business! Richard Rigby CEO Wraith Intelligence 90% of companies will offer BYOD, or bring-your-own-device options to employees by 2014, according to Gartner.
More informationHow-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
More informationONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
More informationMobile Device Management (MDM) Policies
Mobile Device Management (MDM) Policies Best Practices Guide Copyright 2012 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice.
More informationProtecting Your Data On The Network, Cloud And Virtual Servers
Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public
More informationPassword Management Evaluation Guide for Businesses
Password Management Evaluation Guide for Businesses White Paper 2016 Executive Summary Passwords and the need for effective password management are at the heart of the rise in costly data breaches. Various
More informationThe Truth About Enterprise Mobile Security Products
The Truth About Enterprise Mobile Security Products Presented by Jack Madden at TechTarget Information Security Decisions 2013 Welcome to my enterprise mobile security product session! Instead of printing
More informationInformation Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because
More informationBring Your Own Device & the Consumerisation of IT: 2 Case Studies
Bring Your Own Device & the Consumerisation of IT: 2 Case Studies Mark Brockbank, IBM UK Ltd Email: mark.brockbank@uk.ibm.com Twitter: @MarkBrockbank Agenda CIO Challenges in Mobility BYOD Customer case
More informationEMBRACING THE AGE OF MOBILITY
Embracing The Age Of Mobility & The Byod Workplace buzz-worthy acronym or a workplace trend that will eventually fade; it s part of the complete restructuring of the conventional way we ve worked up to
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationMANAGE IT. An Overview of Enterprise Mobility Management Services THE SITUATION THE CHALLENGES THE SOLUTION THE BENEFITS
MANAGE IT. An Overview of Enterprise Mobility Management Services THE SITUATION THE CHALLENGES THE SOLUTION THE BENEFITS THE SITUATION MANAGING ALL DEVICES UNDER THE SUN. As your staff uses more mobile
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationIndustry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation
Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation The Central Florida Chapter of The Florida Government Finance Officers Association 2/7/2014 K. Adam Glover,
More informationGlobal IT Security Risks: 2012
Global IT Security Risks: 2012 Kaspersky Lab is a leading developer of secure content and threat management solutions and was recently named a Leader in the Gartner Magic Quadrant for Endpoint Protection
More informationWHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT
WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT Executive Summary The explosive growth of worker mobility is driving the rapid adoption of mobile devices
More informationMobile Device Management (MDM) Policies. Best Practices Guide. www.maas360.com
Mobile Device Management (MDM) Policies Best Practices Guide www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential
More informationResearch Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
More informationBYOD and Mobile Device Dependency
BYOD and Mobile Device Dependency Thursday, November 8, 2012 Brian Thomas, CISA, CISSP & Shohn Trojacek, CISSP Brian Thomas, CISA, CISSP Partner, IT Advisory Services at Weaver Provides security, IT audit
More informationHow To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
More informationBring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com
Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
More information10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
More informationEnabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media
Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks
More informationBring Your Own Device:
Bring Your Own Device: Finding the perfect balance between Security, Performance, Flexibility & Manageability SECURELINK WHITEPAPER 2012 By Frank Staut Management summary This white paper discusses some
More informationMobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
More informationTHE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers. December 13, 2012 Telephone Seminar/Audio Webcast
1 THE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers Cosponsored with the ABA Law Practice Management Section December 13, 2012 Telephone Seminar/Audio Webcast Android Apps
More informationBring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com
Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
More informationAll can damage or destroy your company s computers along with the data and applications you rely on to run your business.
All can damage or destroy your company s computers along with the data and applications you rely on to run your business. Losing your computers doesn t have to disrupt your business if you take advantage
More informationCloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works
Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationBring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
More informationBRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
More informationMobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall
Mobile security and your EMR Presented by: Shawn Tester & Allen Cornwall Date: October 14, 2011 Overview General Security Challenges & best practices Mobile EMR interfaces - EMR Access - Today & Future
More informationHow to Practice Safely in an era of Cybercrime and Privacy Fears
How to Practice Safely in an era of Cybercrime and Privacy Fears Christina Harbridge INFORMATION PROTECTION SPECIALIST Information Security The practice of defending information from unauthorised access,
More informationUse Bring-Your-Own-Device Programs Securely
Use Bring-Your-Own-Device Programs Securely By Dale Gonzalez December 2012 Bring-your-own-device (BYOD) programs, which allow employees to use their personal smartphones, tablets and laptops in and out
More informationBring Your Own Device
Bring Your Own Device Save costs, deliver flexible working and manage the risks Gary Shipsey Managing Director 25 September 2014 Agenda Bring Your Own Device (BYOD) and your charity and how to avoid the
More informationControl Issues and Mobile Devices
Control Issues and Mobile Devices ACC 626 Term Paper Ramandip Kaur June 27, 2014 Page Table of Contents Executive Summary...ii 1.0 Introduction... 1 2.0 Current Trends... 1 2.1 Employee Owned Devices and
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationSimplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks
Smartphones and tablets are invading the workplace along with the security risks they bring with them. Every day these devices go unchecked by standard vulnerability management processes, even as malware
More informationONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationRemote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
More informationSANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
More informationProtecting Your Roaming Workforce With Cloud-Based Security
Protecting Your Roaming Workforce With Cloud-Based Security How to use the cloud to secure endpoints beyond your perimeter By Tsailing Merrem, Senior Product Marketing Manager Remote and roaming workers
More informationSafe-Guarding Client Information Basic Data Security Training for Lawyers
Safe-Guarding Client Information Basic Data Security Training for Lawyers Sponsored by the Law Practice Management Committee of The New York State Bar Association John R. McCarron Jr, Esq. Partner, Montes
More informationAgenda. BYOD, Texting & Social Media How to Keep BYODFrom Becoming OMG! Introduction: Summit Security Group 2/3/2014
BYOD, Texting & Social Media How to Keep BYODFrom Becoming OMG! Daniel M. Briley, CISSP, CIPP Managing Director Summit Security Group Agenda Introduction BYOD Defined Trends By the Numbers Common Risks
More informationEverything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace
Everything You Need to Know About Effective Mobile Device Management mastering the mobile workplace Table of Contents Introduction... 3 1. What exactly is Mobility Management Anyway?... 4 Impenetrable
More information