Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist
Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2
Mobile Threats Expose Organizations and Consumers 3
Symantec Global Intelligence Network Identifies more threats, takes action faster & prevents impact Calgary, Alberta Dublin, Ireland San Francisco, CA Mountain View, CA Culver City, CA Austin, TX Chengdu, China Taipei, Taiwan Tokyo, Japan Chennai, India Pune, India Worldwide Coverage Global Scope and Scale Rapid Detection 24x7 Event Logging Attack Activity 240,000 sensors 200+ countries and territories Malware Intelligence 180M client, server, gateways monitored Global coverage Vulnerabilities 50,000+ vulnerabilities 15,000+ vendors 105,000+ technologies Spam/Phishing 5M+ decoy accounts 8B+ email messages/day 1B+ web requests/day Preemptive Security Alerts Information Protection Threat Triggered Actions 4
Mobile Malware on the Rise This represents families of mobile malware There are 3,000-4,000 variants in the wild today and growing 5
Mobile Threats Focus Areas for Malware Authors Stealing information, spying and sending SMS messages Malware authors porting old threats and working on new ones Most popular way to make money - Sending premium SMS 6
A New Source of Data Breaches Mobile devices contain work and personal information Unlike a desktop computer they are easily stolen. And often lost 7
Project Honey Stick Los Angeles San Francisco Washington, D. C. New York Ottawa 8
9
10
It doesn t matter where the information is!!! EMAIL ADDRESS ACCOUNT INFO DATES OF BIRTH SOCIAL SECURITY NUMBERS USER IDS EMAIL CONTACTS PASSWORDS IP ADDRESSES NAMES DATA PURCHASES EMAIL ADDRESS ACCOUNT INFO DATES OF BIRTH SOCIAL SECURITY NUMBERS USER IDS EMAIL CONTACTS PASSWORDS IP ADDRESSES NAMES DATA PURCHASES 11
Changes In Working Style 80% 1 65% 2 52% 3 New apps deployed in the cloud Enterprises allow mobile access to their network Workers use three or more devices Sources: 1. IDC Predictions 2012: Competing for 2020, Frank Gens, IDC, December 2011 2. The Impact of Mobile Devices on Information Security: A Survey of IT Professionals, Check Point, January 2012 3. Info Workers Using Mobile And Personal Devices For Work Will Transform Personal Tech Markets, Frank E. Gillett, Forrester Research, February 22, 2012 12
No Conventional Control 13
2013 Symantec State of Mobility Canada 14
Methodology ReRez surveyed 3,236 global organizations across 29 countries North America (2 countries) United States Canada Latin America (9 countries) Mexico Brazil OLAM EMEA (5 countries) United Kingdom Germany France Italy South Africa APJ (13 countries) China Japan Australia/New Zealand India Singapore South Korea Hong Kong Malaysia Taiwan Thailand Philippines Indonesia 15
Innovators vs. Traditionals Innovator Organizations Welcome change View change as opportunity Early adopters of new technology Proactive (create change) Innovative (change to create opportunity) Traditional Organizations Only change after studying the issue View change as risk Late adopters of new technology Reactive (react to change if necessary) Employ time-honoured practices 16
Key Findings 1. Innovators have different attitudes about mobility 2. Mobility is more prevalent in Innovators 3. Mobility policy and management more evolved in Innovators 4. Innovators experience more mobility costs 5. Innovators experience more mobility benefits 17
Innovators Attitudes are Different Innovators motivated to pursue mobility by business drivers 84% of Innovators consider important (higher than any other driver) 52% for Canada Traditionals motivated by end user demand 51% of Traditionals consider important (higher than any other driver) 50% for Canada Innovators say mobility risk worth the opportunity (Traditionals don t agree) 37% for Canada 18
Mobility More Prevalent in Innovators Significantly more employees using smartphones 55% of Innovators vs. 44% of Traditionals employee phones purchased by company 56% for Canada More likely to use business apps on mobile devices 83% of Innovators discussing private app store for business-related mobility apps, vs. 55% of Traditionals 52% for Canada 19
Mobility Management More Evolved in Innovators More likely to have a mobility policy More likely to extend management to employee-owned devices More aggressive in enforcing policy (use technology instead of manual) 60% Innovators vs. 33% Traditionals 36% for Canada More likely to adopt mobility information protection measures More likely to adopt mobility management measures 20
Innovators Experience More Mobility Costs 21
Innovators Experiencing Larger Mobility Benefits 22
Best Practices for BYOD 23
Recommendations 1. Being cautious about mobility is okay. Being resistant is not. Start embracing it. 2. Start with the apps with greatest productivity benefits for employees. 3. Learn from the innovators get the benefits while minimizing the risks. 24
Managed Unmanaged Evolving Endpoint Adoption Map Evolving Focus Company Owned But Unmanaged Company Controls Relevant Apps & Data Only Traditional Focus Company Controls Standard Device Company Controls Personal Device Company-owned Personally-owned 25
Comprehensive Device Management Configure Devices Self-service enrollment Configure Email, VPN, Wi-Fi Identity Certificates Distribute Apps In-house apps or public-store apps Docs, videos any active content Group based management Manage Assets Centralized visibility and control Automated workflows Scalable to 20,000+ devices Apply Policies Passwords, App restrictions Compliance with Jailbreak Selective wipe and Full wipe 26
Secure Access Wi-Fi VPN CA Network Access 27
Protect Apps and Data Clear Separation of Information Personal apps Personal data Corporate apps Per-app policies Pinpoint revocation 28
Bring Your Own Device (BYOD) Success = Mastering BYOD Control Points Devices Apps Data without disrupting user experience 29
Mitigating Mobile Threats Device Management Device Security Remotely wipe devices in case of theft or loss Update devices with applications as needed without physical access Get visibility and control of devices, users and applications Guard mobile device against malware and spam Prevent the device from becoming a vulnerability Enforce compliance across organization, including security standards & passwords Content Security Identify confidential data on mobile devices and use technologies to prevent future exposure Protect data from moving between applications Encrypt mobile devices to prevent lost devices from turning into lost confidential data Identity and Access Provide strong authentication and authorization for access to enterprise applications and resources Ensure safe access to enterprise resources from right devices with right postures 30
Best Practices for BYOD Assess Data Classification Assess threats, conduct a risk analysis, run a policy audit and an apps audit, evaluate architectural planning and security. Determine what sensitive information exists in your organization Categorize it appropriately and protect it according to its classification level Encryption Create and enforce security policies so all confidential information is encrypted Data Loss Prevention Discover data spills of confidential information. Detect and prevent exfiltration of confidential information Security Awareness Training Ensure employees become the first line of defense against socially engineered attacks, such as phishing, spear phishing, and other types of attacks 31
Thank you! Copyright 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 32