Bring Your Own Device Bring Your Own Data? Thursday 10th April 2014 Dai Davis Solicitor and Chartered Engineer Partner, Percy Crow Davis & Co

Similar documents
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

[BRING YOUR OWN DEVICE POLICY]

Mobile Operating Systems & Security

Mobile Device Management and Security Glossary

BYOD: End-to-End Security

THE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers. December 13, 2012 Telephone Seminar/Audio Webcast

THE ENTERPRISE MOBILITY POLICY GUIDEBOOK

Tuesday, June 5, 12. Mobile Device Usage

Mobile Device Management Glossary.

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Mobile Security: Controlling Growing Threats with Mobile Device Management

SECURING TODAY S MOBILE WORKFORCE

Feature List for Kaspersky Security for Mobile

A Review of Different Comparative Studies on Mobile Operating System

McAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always.

IBM Endpoint Manager for Mobile Devices

Securing your Mobile Environment. Mark Villinski Kaspersky Lab Jeremy Clough Gorham Savings Bank

Secure Your Mobile Workplace

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Guideline on Safe BYOD Management

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Mobile Device Security Is there an app for that?

SNOOPWALL FLASHLIGHT APPS THREAT ASSESSMENT REPORT

The Enterprise Mobility Policy Guidebook

Mobile Application Marketplace 2015: Market Analysis and Assessment of Future Evolution and Opportunities

Kaspersky Security for Mobile

Managing and Securing the Mobile Device Invasion IBM Corporation

RingCentral Meetings QuickStart Guide

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

Kaspersky Security 10 for Mobile Implementation Guide

Securing Corporate on Personal Mobile Devices

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

Hippo Remote Pc Software -- Fresh Information Spy Software With Remote Install And Android Monitoring $ Scam Or Work?

Exchange 2010 ActiveSync: Connection

Are free Android virus scanners any good?

Why you need. McAfee. Multi Acess PARTNER SERVICES

Enterprise Mobility Solution Puts Unified Communications on the Smartphones Employees Love

How To Manage A Mobile Device Management (Mdm) Solution

SANS Mobility/BYOD Security Survey

Symantec Mobile Management Suite

M a as3 6 0 fo r M o bile D evice s

7 Things You Need to Know about Virtual Mobile Infrastructure

Mobile Device Security and Privacy. Discussion - Planning Considerations for a Successful Mobile Device Program

Mobile Device Security

BENEFITS OF MOBILE DEVICE MANAGEMENT

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1

Mobile Accessibility. Jan Richards Project Manager Inclusive Design Research Centre OCAD University

Samsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics

A Guide to MAM and Planning for BYOD Security in the Enterprise

Monitoring and control of users in open environments on the Android platform

ForeScout MDM Enterprise

BYOD Policy for [AGENCY]

The ForeScout Difference

Berlin Institute of Technology FG Security in Telecommunications

How to Remotely Track Any Lost Smartphone, Tablet, or PC

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

SANS Mobility/BYOD Security Survey

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Industry Analysis of the Nigerian Mobile Technology Development

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Mobile Device Management for CFAES

How To Protect Your Smartphone From Attack From A Hacker (For Business)

U.S. Mobile Benchmark Report

Smartphone Security Survey of U.S. consumers

Policy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Google Identity Services for work

Security and Compliance challenges in Mobile environment

Mobile Security Standard

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Presented Talk : PoC(k)ET, les détails d'un rootkit pour Windows Mobile 6. Sogeti - ESEC R&D

Mobile Security & BYOD Policy

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Smartphone Vulnerabilities Securing your personal and business data

10 Quick Tips to Mobile Security

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

Corporate-level device management for BlackBerry, ios and Android

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

UNLEASH THE POWER OF YOUR MOBILE DEVICE.

EndUser Protection. Peter Skondro. Sophos

How To Secure Your Smartphone Applications

8 Things to Know. App Developer. 8 Things to Know Before You Hire Your App Developer v1.1 Copyright 2014, Feltpad, Inc.

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Compliance Management for Mobile Devices

Exchange ActiveSync (EAS)

BlackBerry Passport Smartphone. Version: User Guide

Chris Boykin VP of Professional Services

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

The Need for BYOD Mobile Device Security Awareness and Training

Case Study: Smart Phone Deleted Data Recovery

Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines

Mobile Device. Management-

ST JOHNS PARK HIGH SCHOOL BYOD POLICY

IT Resource Management & Mobile Data Protection vs. User Empowerment

How to configure your mobile devices post migrating to Microsoft Office 365

The User is Evolving. July 12, 2011

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

MobileConnect. Getting Started Guide

Transcription:

Bring Your Own Device Bring Your Own Data? Thursday 10th April 2014 Dai Davis Solicitor and Chartered Engineer Partner, Percy Crow Davis & Co Tel: 07785 771 721 E-mail: mail@daidavis.com

Overview BYOD in Context BYOD Benefits BYOD Risks and Threats Operating Systems Apps Other risks BYOD Security BYOD Policy, Guidance and Solutions

What do we mean by BYOD Types of device Smartphone Tablets and PC (Laptop) As with public/private/hybrid cloud : different policies / risks for each

Guidance in Sales Brochures (2) Vodafone Use device manager s lock and wipe Back-up data Create a SIM lock Install security (app) software Report lost or stolen phones See ICO guidance!

Devices being sold? (1 st ¼ 2013) Android -75.0% ios - 17.3% Windows Phone - 3.2% Blackberry OS 2.0% Linux 1.0% Symbian - 0.6% (Nokia phasing out) Others - < 0.1%

Devices in Corporate Use Decisive Analytics, August 2012 Android 69% Blackberry 69% Apple - ios 54% Windows 50% Symbian 24%

BYOD Benefits Staff satisfaction Empowerment, best of breed Flexibility => work harder! Competitive advantage Formal BYOD policy reduces staff work-around Tax break bicycles and childcare Health benefits?

Risks Operating Systems Operating systems Tablets and PC (Laptop) Better update / antivirus Blackberry Apple ios7 40 Nokia - Microsoft Android More than11,000 instantiations < 6½ % current (Source TrendMicro)

Apple: Linked In Calendar Data Caught using ios app to copy data from iphone and Android calendars on 5 June 2012 Subject, location, time of meeting and meeting notes One day later issued a miscellaneous bug fixes and Improvements in Calendar

HTC Issue Taiwanese manufacturer HTC 18 Million Android and Windows Mobile (not Windows 8) phones Not used reasonable security practices E.g. text-message toll fraud Charged by FTC (and settled) in February 2013

Other Device Governance Blackberry OS (RIM) - for sale! Do operate an approval scheme Similar to Apple? Windows Mobile No control over apps Nokia - Symbian now open source Tizen Samsung and Intel, Linux Foundation (OS), user consistency

App Issues Security Firm Lookout 47% of Android Apps 23% of Apple Apps Collect some form of user data May only be location data Research University of California ⅓rd ask for unnecessary permissions Blackberry BBM 17 permissions audio recording

Blackberry BBM App on Android 1 1. Your messages: Send SMS messages 2. Storage: Modify or delete the contents of your USB storage 3. Your location: Precise (GPS) location 4. Microphone: Record audio 5. Camera: Take pictures and videos 6. Your applications information: Retrieve running apps 7. Your personal information: Add or modify calendar events and send e-mails to guests without owners' knowledge, read calendar events plus confidential information 8. Your accounts: Add or remove accounts, create accounts and set passwords 9. Phone calls: Read phone status and identity

Blackberry BBM App on Android 2 10. Network communication: Control near-field communication, full network access 11. Your social information: Modify your contacts, read your contacts 12. System tools: Test access to protected storage 13. Affects battery: Control vibration 14. Your applications information: run at start up 15. Wallpaper: Set wallpaper 16. Network communication: View WiFi connections, view network connections 17. Your accounts: Find accounts on the device

Additional Risks and Threats E-mail risks do not distinguish between device Example: Phishing How robust is the Antivirus software? Additional threats Information-stealing malware Zitmo Apps

Additional Threats WiFi Loss E-mail phishing Insufficient management tools, access to APIs limits to core architecture for antivirus software Near Field Communication and proximity hacking

Bring Your Own Device Bring Your Own Data? Thursday 10th April 2014 Dai Davis Solicitor and Chartered Engineer Partner, Percy Crow Davis & Co Tel: 07785 771 721 E-mail: mail@daidavis.com