BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence



Similar documents
The Maximum Security Marriage:

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management.

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

Bring Your Own Device (BYOD) and Mobile Device Management

BYOD in the Enterprise

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

Feature List for Kaspersky Security for Mobile

How To Manage A Mobile Device Management (Mdm) Solution

Guideline on Safe BYOD Management

How To Protect Your Mobile Devices From Security Threats

Don t Let A Security Breach Put You Out of Business

How To Support Bring Your Own Device (Byod)

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

SANS Mobility/BYOD Security Survey

EndUser Protection. Peter Skondro. Sophos

Samsung Mobile Security

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

The flexible workplace: Unlocking value in the bring your own device era

Smart Givaudan. From BYOD experience to new mobile opportunities

Cloud Backup and Recovery for Endpoint Devices

BYOD. Bring Your Own Device - Mobile Device Management.

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

10 Quick Tips to Mobile Security

Tom Schauer TrustCC cell

How To Write A Mobile Device Policy

ForeScout MDM Enterprise

BYOD BEST PRACTICES GUIDE

The ForeScout Difference

IBM Endpoint Manager for Mobile Devices

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Multi-Factor Authentication FAQs

ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM

The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER

ADDING STRONGER AUTHENTICATION for VPN Access Control

IT Resource Management & Mobile Data Protection vs. User Empowerment

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

EasiShare Whitepaper - Empowering Your Mobile Workforce

If you can't beat them - secure them

BYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

BYOD Policies: A Litigation Perspective

The Cloud App Visibility Blindspot

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

Mobile Access Software Blade

Managing Mobility in the BYOD Era:

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Kaspersky Security for Mobile

Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e

Hands on, field experiences with BYOD. BYOD Seminar

BENEFITS OF MOBILE DEVICE MANAGEMENT

Addressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA

How To Secure Your Mobile Device

Windows Phone 8.1 in the Enterprise

Bring Your Own Device Policy

Mobile Devices in Healthcare: Managing Risk. June 2012

YOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

What We Do: Simplify Enterprise Mobility

Transcription:

BYOD AND ME How cell phone hacking effects your business! Richard Rigby CEO Wraith Intelligence

90% of companies will offer BYOD, or bring-your-own-device options to employees by 2014, according to Gartner. On top of that 90% of the smartphone market will be either a samsung or ios device, leaving blackberry, windows phones, LG and HTC etc to fight over the remaining 10%!!

!! WHAT DOES BYOD MEAN? Bring your own device, or BYOD, is a disruptive phenomenon where employees bring non-company IT into the organisation and demand to be connected to everything. Without proper accountability or oversight.

A new Gartner report predicts that by 2016 about 20 percent of companies will ultimately fail to find the proper balance between these dueling priorities. "Given the control that IT has exercised over personal computers by developing and deploying images to company-managed PCs, many IT organisations will implement strong controls for mobile devices," Ken Dulaney, a Gartner vice president, said in the report.!

THE RESULT!!! Employees are becoming sensitive to giving IT organisations access to personal devices and demanding solutions that isolate personal content from business content and restrict the ability of the IT organisation to access or change personal content and applications.

The fact that 15 percent of mobile-device users store their password details personal and business alike on their smartphones and that one in three don't use a PIN or password to safeguard access to their devices makes life even more difficult for IT managers straddling the line somewhere between Big Brother and Mr. Magoo." "Whether via formal BYOD programs, or just via devices coming in the back door and being configured to access corporate systems, the use of consumer technologies in the work environment presents a threat to IT control of endpoint computing resources," Dulaney added.

BYOD forces you to wrestle with three key operational challenges:

Governance & Compliance! BYOD could cause you to violate rules, regulations, trust, intellectual property and other critical business obligations.! Mobile Device Management! You need to manage growing workforce expectations around mobility. Your employees use many devices and they expect to use any device or application anytime, anywhere.! Security! If left unmanaged, BYOD can lead to loss of control, impact your network availability, and cause data loss. You need the right network access strategies and policies in place to secure your environment.

Mobile Device Management" You need to manage growing workforce expectations around mobility. Your employees use many devices and they expect to use any device or application anytime, anywhere.! What strategies are you using to manage the consumer invasion of mobile devices? You need to help manage cost and risk, meet the goals of the business and keep employees happy. It's a tall order.! Learn how demands for mobility outpace the ability of your enterprise.! User Expectations: Consumerisation of IT is winning. Can I find a way to set business rules for BYOD configurations without frustrating my users?! Cost: How much money do I need to reserve for new IT investments to support BYOD programs? How do I contain my costs?! Tools: Flexible ways to manage it all. What tools are available to manage and secure company information assets in the BYOD world? How many tools do I need? Can I recycle my company PC tools? Must I resort to the "honour system"?

Security" The key to a secure device is having a well-managed device. How should you secure your environment? How much management is enough?! If left unmanaged, BYOD can lead to loss of control, impact your network availability and cause data loss. You need the right network access strategies and policies in place to secure your environment.! Data Leaks: Sensitive information loss is a certainty. How can I ensure that company data is in the right place at the right time, encrypted and ultimately deleted according to my business rules?! Network Protection: Patch releases, identity and audit management, and more. What access controls will I need to decide which devices can open a VPN or connect an employee to the company Wi-Fi? Do I want to put incompletely unmanaged devices on my LAN?! Stolen Devices: Devices are too easy to lose. Loss and theft statistics are staggeringly high, and not just usinesses will choose and use mobile technology, services and tools to support customers and employees.

DID YOU KNOW?! By 2016, 20% of enterprise BYOD programs will fail due to deployment of mobile device management measures that are too restrictive.

! How can you ensure that your employees aren't really bringing-their-own-demons into work, that you - the IT Manager -now have to deal with?

Here are the pros:! Productivity is up. Especially outside of normal working hours. 70% of employees with smart phones regularly check their work email account when they're "off the clock," so to speak.!! Bring your own device is tied to increased employee satisfaction. Employees want to be mobile, want to use their Androids to check their email and their ipads to access the same files they would if they were working from their office laptop. But they don't want to sacrifice the perks associated with employer-provisioned devices, like IT support or secure wireless coverage.

Here are the cons:" You got a sea of corporate data now at the mercy of the employee. So what happens if their phone gets stolen or dropped in the swimming pool- who is responsible for replacing it? What if the employee downloads a malicious app that compromises company data? What happens to all that information when an employee leave the company... it just walks out with them?! All of a sudden you have personal photos, bank accounts, and social networking sites mixing with proprietary company files, personal information about employees, financial reports, presentations, emails... If that information falls into the wrong hands and is then used to commit identity theft or wreak other sorts of havoc, the company could be held liable.

Fact 1

Over 50% of smartphone and tablet users do not password protect their devices and more than 2/3 of users are perpetually logged into their applications.

Fact 2

According to backgroundcheck.org, $7 million worth of phones are lost every day around the globe. 2/3 of phone losses happen between 9 p.m. and 2 a.m.! How many phones are lost or stolen in London everyday??!

Fact 3

! 66% of employees who use their personal devices at work currently say that their organisation does not have a BYOD policy.

Fact 4

! The average cost of a corporate data breach is $7.2 million

Fact 5

! A 2012 report from the U.S. Department of Health's Office of Civil Rights found that in three years, 21 million patients became the victims of medical record data breaches.

Companies need to create a well-defined, transparent BYOD policy that employees sign off on. The policy should set expectations as to which responsibilities would fall under the employee and which under the employer.! When writing your policy, here are some questions to get you started:! Should we limit access to some data?! How will we support different devices?! When do we have the right to access employee-owned devices?! Can our network handle the added traffic?! Should we whitelist and blacklist apps to protect devices and data? Should we create an internal app store instead?! Will specific apps be pushed to employee-owned devices?

Can we remotely wipe any device in case it s lost or stolen, or if an employee is terminated?! Who pays for what? How do we determine monthly stipends?! Embracing BYOD in your workplace does not have to be wrought in terror and night-sweats. If properly planned for, the advantages to your business may far outweigh the risk.! A good first step is assessing your wireless network to ensure it is stable and robust enough to accommodate BYOD.

Increase Security BYOD SOLUTION Decrease Security

Essentially in the modern era. We at Wraith Intelligence define threats to your BYOD policy originating from two distinct parties"! Government Threats"! Non Government Threats

Remember! By 2016, 20% of enterprise BYOD programs will fail due to deployment of mobile device management measures that are too restrictive.