SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
Securing
                                                          your mobile success




it’s time to sToP thinking about security as a reason to say
‘no’ and sTArT thinking about it as a reason to say ‘yes’.

Advances in technology and mobility come at            in this guide you’ll find 15 practical tips,
us fast and furiously. successful businesses will      suggestions and ideas you can implement right
embrace the technologies that spur growth but          now to help secure your business. if you want to
also remain aware of potential risks and have a        dig deeper, we offer links to many other sources of
plan to deal with them.                                inspiration.


it starts with understanding the many available        Dive in now for ideas on how to securely harness
security features and tools on the market. This will   the power of mobility.
help you make better decisions about the wireless
technologies that are best for your business.




                                                                A GUIDE TO SECURING YOUR BUSINESS         2
15 wAys
       To secure your business
Practical Business security advice

 1. what’s your organization’s mobile security iQ? »
 2. Get educated: learn from other businesses »
 3. Kickstart a new iT risk Attitude »



device, aPP & network tiPs

 4.   Discover built-in blackberry Defenses »
 5.   beyond Pass-code lock: Keeping your iPhone and Data safe »
 6.   is Android secure enough for business? »
 7.   master mobile Device management »
 8.   securing Personal Devices at work »
 9.   Do you Know where Those Apps Go? »
10.   Hit the road Jack: mobile computing made safe »
11.   shut out Hackers: secure your wireless wi-Fi network »
12.   make network Downtime a Thing of the Past »



emerging technology tiPs

13. securing the cloud »
14. i spy: monitoring your business from Afar »
15. Protecting against emerging Threats »




                                                               A GUIDE TO SECURING YOUR BUSINESS   3
1
                   What’s Your Organization’s
                   Mobile Security iQ?
                   How does your business rank when
                   it comes to proactive security?




don’t assume your Business is secure. Find out For sure.


Why It matters
Assessing the security risk of the technology, processes and people
that support your business is the first step in securing your business.
self assessment tools, like the ones to the right, are easy, fast and
typically free. so why not start now?


What It Can Do For your BusIness
                                                                                     identify security risks and monitor your
 •	 Help you evaluate where your business stands and give you ideas
                                                                                     ability to respond to threats in your
    on how to mitigate future risk.                                                  computing environment with
                                                                                     Microsoft’s Security Assessment Tool.
 •	 identify the greatest risks to your business and prioritize which to
    tackle first.
 •	 create a “wake-up call” for your leadership team on risks and priorities.


3 thInGs you Can Do noW
 1. Take the quiz. no matter what your score, you’ll find opportunity
    for improvement or reinforcement of what to keep doing.
 2. Share the results with your staff to educate them on risks.
 3. Build awareness with your leadership team. share your scores,
    including how you fared on existing security measures, to help get               Find out how well your business is
    buy-in for future security proposals.                                            protecting personal information and
                                                                                     how compliant you are with mandatory
                                                                                     regulations with this self assessment tool
                                                                                     from the office of the Privacy
                                                                                     commissioner of canada.




                                                                                A GUIDE TO SECURING YOUR BUSINESS                 4
2
                  get educated:
                  Learn from Other Businesses
                  What are successful companies
                  doing to protect their business?




get security survey highlights and Practical moBile advice.


Why It matters
smart companies are becoming more proactive about security, deploying
security processes and security tools to protect their business and gain a
competitive edge. learn from them in the latest security research.


What It Can Do For your BusIness
 •	 Fuel change – security best practices from other businesses can                  Get highlights from the 2010 cio
                                                                                     security survey and practical mobile
    help motivate your leadership team to act now.                                   security tips with this webinar from iT
 •	 Keep you focused on what matters – figure out where to focus                     world canada.

    your efforts and how to prioritize security initiatives.
                                                                                                     read this white paper
 •	 secure your business faster with practical ideas from companies                                  for a realistic vision of
    like yours.                                                                                      how mobile security
                                                                                                     needs to be considered
                                                                                                     to help businesses grow
3 thInGs you Can Do noW
 1. read free annual security reports – Take a look back at the past
    year and ahead to the threats we can expect. Access a full list of
    free reports from security companies, publishing organizations and                               Deep dive into security
                                                                                                     best practices with the
    iT research businesses here.
                                                                                                     2012 Global state of
 2. Subscribe to free ongoing security news e-blasts or blog posts –                                 information security
                                                                                                     survey® from Price
    stay on top of the latest threats with expert advice from iT publishing
                                                                                                     waterhouse coopers.
    companies like iT world canada, Tech republic or cneT.
 3. Be part of the conversation – security is a hot topic. now is the
    time to reach out to your network of tech colleagues or attend a
    mobile tech security event for advice.




                                                                              A GUIDE TO SECURING YOUR BUSINESS                  5
3
                   Kickstart a new iT risk Attitude
                   Your employees: responsible risk takers or data daredevils?




Bring risk management out oF the it dePartment and into everyone’s joB.


Why It matters
Human error is the primary cause for security breaches in business
today, yet most organizations provide little on-going security
education to non-iT staff. with the rest of the company thinking
risk and security is iT’s responsibility, it’s wise to consider making risk
                                                                                   Find out how to make risk
management everyone’s job.                                                         management more personal in your
                                                                                   business with this blog post.

What It Can Do For your BusIness
 •	 significantly increase the level of security in your business.
 •	 build a culture of security and responsibility.
 •	 Help your business be more proactive in new technology decisions.


3 thInGs you Can Do noW
 1. Make all employees risk managers. Add accountability for risk
    management to performance goals for everyone across the company.
                                                                                   learn about what global iT managers and
 2. Build a comprehensive communication plan that teaches                          cios are doing to better mitigate risk with
                                                                                   this Global risk study from ibm.
    employees about emerging threats, security policies, and
    best practices.
 3. commit to ongoing risk management training.
    The lack of end-user training is a growing threat to iT security.              want more?
                                                                                   Get tips on how to help employees
                                                                                   understand data risk management here »




                                                                              A GUIDE TO SECURING YOUR BUSINESS                  6
4
                  Discover Built-in
                  BlackBerry Defenses
                  Your BlackBerry smartphone is a security powerhouse.
                  Are you harnessing its power for good?




get BlackBerry security tiPs and tricks straight From the Pros.


Why It matters
over the last decade, rim has built a sound reputation on the strength
of its security features. This has much to do with business enterprise
(bes) software. but even the best software doesn’t protect against
                                    ®
uninformed or negligent blackberry users. implementing a few quick
and easy safeguards can go a long way in securing your devices and
the information on them.
                                                                                check out this webinar to find out more
                                                                                about blackberry built-in security tools.
                                                                                                  ®




What It Can Do For your BusIness
 •	 Protect against unwanted applications and malware.
 •	 manage multiple devices on rim’s stable and secure
    operating system.
                                                                                want more?
 •	 Protect your sensitive data no matter how it’s accessed.                    check out the blackberry security
                                                                                                          ®



                                                                                knowledge base for a wealth of
                                                                                information on all aspects of security
3 thInGs you Can Do noW                                                         for blackberry devices.
                                                                                              ®




 1. Set a password policy with a minimum length of 5 characters and
                                                                                Get 5 tips from cio.com to keep your
    a maximum of 10 password tries before automatic device self wipe.           blackberry smartphone safe here.
                                                                                          ®




    click here to find out how to add a password to your smartphones.
 2. encrypt data stored on your device and/or your microsD media
    card in four simple steps. click here to find out how.
 3. Wipe devices before they are passed on to another employee. Go to
    the options menu on the device, select security, then security wipe.
    it will ask you to type in BlackBerry to complete the wipe.




                                                                           A GUIDE TO SECURING YOUR BUSINESS                7
5
                  Beyond Pass-code Lock:
                  Keeping Your iPhone and Data Safe
                  Have you thought beyond the basics?




learn how to keeP inFormation secure on Business iPhones.


Why It matters
Apple has polished the business features of its operating system with
security that stretches well beyond pass-code locks. From exchange and
remote wipe support, security and configuration to VPn options and
encryption, Apple users can now keep their iPhones and the data they
                                                    ®




access safe.

                                                                                      Hear what Apple has to say
What It Can Do For your BusIness                                                      about iPhone security in this
                                                                                                   ®



                                                                                      on-demand webinar.
 •	 Provide a layered approach to keeping your information secure
    with device policies, restrictions and encryption.
 •	 Protect all data stored on devices with hardware encryption.
 •	 clear data and settings remotely in the event of loss or theft.


3 thInGs you Can Do noW
 1. Manage iPhone through the central console. set up
                      ®



    accounts, set restrictions, and configure devices quickly
    and remotely using iPhone 4’s console for mobile device
                                ®



    management. click here to find out how.                                           Get informed: everything you want
                                                                                      to know about Apple’s security
 2. Set up VPn access and teach your employees how to turn it on,                     features for iPhone here.
                                                                                                         ®



    so you can communicate private information securely over a public
    network. Get help on setting up VPn here.
 3. get a security app. security apps can add another layer of protection
    for business, from biometric security apps that authenticate users with        want more?
    the touch of a finger, to anti-malware or even alarms that protect your        Get more security tips on how to secure
    device from theft or loss.                                                     your data from Apple here.




                                                                              A GUIDE TO SECURING YOUR BUSINESS              8
6
                   is Android Secure enough
                   for Business?
                   Did you know the latest Android devices are
                   packed with better security features?




get Better control and security over Personal and Business devices.


Why It matters
why should you care about Android ? employees are increasingly opting to
                                    ™




bring their personal devices to work. Android , Google’s operating system that
                                               ™




powers many of the world’s smartphones, gives you the ability to manage and
secure a good portion of these devices from one simple operating system.
                                                                                  Get security advice straight from Android™



                                                                                  in this on-demand webinar webinar here.
What It Can Do For your BusIness
 •	 better control over personal and business mobile devices at work.
 •	 Access to a universe of third-party security solution providers who                              Get informed:
    can quickly custom build secure apps for your business on                                        5 things you
    Android’s open platform.                                                                         should know
                                                                                                     about Android     ™



 •	 set-up, configure and perform frequent security updates with                                     for business.
    relatively little effort using auto-discovery features.


3 thInGs you Can Do noW
 1. Stop saying ‘no’ to personal devices. The last thing you want is
                                                                                  want more?
    a rogue experience at your company. An informed iT department is
    the best way to ensure your business is secure. Get advice on how             learn 6 ways to protect your Google
                                                                                  phone here.
    to manage personal devices at work here.
                                                                                  check out this essential guide to Android   ™


 2. Adopt mobile device management (MDM). This is a critical part                 at work for business users here.
    of managing the plethora of Android devices, so take the time to
                                           ™

                                                                                  Get 10 tips to turn Android into a
                                                                                                             ™



    chose features wisely. Get mDm advice here.                                   business phone here.
 3. use google apps to manage Android security policies.
    Google Apps Device Policy Administration can help you enforce
    policies and remotely wipe lost or stolen devices.



                                                                             A GUIDE TO SECURING YOUR BUSINESS                    9
7
                   Master Mobile Device Management
                   Are you managing mobile technology on the fly?




centralize your control. minimize the risk.


Why It matters
                                                                                                      Find out how mobile
many businesses have a myriad of devices and operating systems accessing                              device management
                                                                                                      can benefit your
company data. How prepared are you to manage yours? mobile device
                                                                                                      business with this
management (mDm) tools are quickly becoming a must-have. not only can                                 white paper
                                                                                                      from Juniper and
they help centralize the control, security and costs of these devices, but they
                                                                                                      enterprise strategy
can also minimize the time spent on maintenance.                                                      Group.


What It Can Do For your BusIness
                                                                                                      This e-book is chock
 •	 manage assets, inventory management, software licenses, security                                  full of juicy discussions
    controls, and more.                                                                               on the latest trends in
                                                                                                      mobility. Topics covered
 •	 Quickly authenticate your staff, regardless of their device.                                      include mobile device
 •	 speed up device and software deployment and reduce downtime by                                    management and app
                                                                                                      development. skip to
    diagnosing and fixing problems remotely.                                                          page 70 for specific
                                                                                                      advice on device
                                                                                                      management tools.
3 thInGs you Can Do noW
 1. Prioritize mobile device security and management needs. Figure 6,
    page 7 of Juniper’s whitepaper has a great list to get you started.
 2. choose an integrated MDM solution instead of many individual
    tools. ideally it should integrate with network access controls, support
    all popular devices and cover the full life cycle of devices. check out
    these mDm players: Juniper, mobileiron and Trellia.
 3. Mean what you say: enforce policy. monitor device usage, limiting or
    removing privileges where necessary, and blocking insecure sites or networks.




                                                                                  A GUIDE TO SECURING YOUR BUSINESS          10
8                   Securing Personal Devices at Work
                    is it time for a Bring Your Own Device (BYOD) policy
                    for your business?




give your team the tools they need to securely access corPorate data
From Personal smartPhones or taBlets.


Why It matters
Today’s workers are bringing their own personal smartphones, tablets and
laptops to the office for both personal and professional use. many businesses
have accepted this reality and are creating strategies that offer employees more
freedom in exchange for a higher level of personal accountability.


What It Can Do For your BusIness
 •	 Keep employees happy and productive while reducing cost of
    ownership for devices.
                                                                                        Find out how your business can capitalize
 •	 support telecommuters and create a more flexible work                               on byoD in this webcast and white paper
    environment                                                                         from unisys.

 •	 reduce unauthorized access to company data from staff-owned devices.


3 thInGs you Can Do noW                                                                 want more?
                                                                                        Get tips from unisys on developing a
 1. Set clear expectations and policies. be clear about which
                                                                                        byoD policy here.
    personal mobile devices are allowed in the workplace and how
                                                                                        7 questions you should answer before you
    you expect staff to keep these devices safe (managing passwords,                    implement byoD at your company. sybase.
    using only sanctioned apps etc.).
                                                                                        see how smart companies are letting
 2. invest in a mobile device management solution. retain control                       employees use their personal gadgets to
    and visibility over all devices from a central platform, installing                 do their jobs. wall street Journal.

    software that creates walls between corporate and personal data
    and enables data blocking or wiping.
 3. revisit reimbursed policies. some companies are moving to a
    shared-responsibility model, implementing optional byoD policies
    and supporting them with grants, stipends, and loans.



                                                                                   A GUIDE TO SECURING YOUR BUSINESS                11
9
                   Do You Know
                   Where Those Apps go?
                   got the latest must-have business app?
                   How do you stop it from accessing off-limit data?




make sure to include aPPs as Part oF your regular moBile security check.


Why It matters
Apps can pack a lot of power into your pocket. before inviting them in, make
sure you know the full capabilities of these programs, including the amount
of information they take from your employees’ devices. including apps as part        Find out how mobile apps access personal
                                                                                     data and explore security with this report
of your regular mobile security check can help keep your business safe.              from Lookout Security.


What It Can Do For your BusIness
 •	 Prevent staff from unintentionally exposing your network and
    devices to viruses and hackers.
 •	 limit the downloading of malicious, pirated or repackaged
    applications from unofficial websites.
 •	 ensure that apps on business-used devices are not accessing
    sensitive business data without your permission or knowledge.
                                                                                     watch this video from No Panic Computing
                                                                                     to learn how to change Facebook privacy
3 thInGs you Can Do noW                                                              settings to stop it from accessing employee
                                                                                     information.
 1. Say ‘no’ to app permissions. Did you know nearly one third of
    apps in major apps stores access users’ locations? And an increasing
    number also access contacts? make sure users know when to say ‘no’
    to apps that are requesting this kind of information access.
 2. create a pool of approved apps. Define app download policies
    and make sure users only download (and update) approved software.
 3. use application access control software. not all apps are what they
    seem. These tools look at how your device is behaving and, if it sees
    something suspicious, quarantines and even remote wipes it.




                                                                                A GUIDE TO SECURING YOUR BUSINESS             12
10
                   Hit the road Jack:
                   Mobile computing Made Safe
                   A few simple changes to the way you use mobile computers
                   can go a long way in protecting your business.




Protect your moBile devices and the inFormation they access From theFt.


Why It matters
your business is contained on your employees’ laptops, notebooks and
tablets, yet the increasing complexity of technology, connectivity, security
and confidentiality creates unprecedented risk. whenever sensitive
data is stored outside firewalls or accessed through wi-Fi and remote
networks, it’s smart to take added security measures to minimize risk.


What It Can Do For your BusIness                                                    Get tips on how to make mobile
                                                                                    computing safe in this on-demand
 •	 Help employees work safely from home or on the road.                            webcast.

 •	 Protect your business from theft of intellectual property or
    valuable devices.                                                               mobile Computing Video tips
                                                                                    from no Panic Computing
 •	 limit access to important data to the intended user.
                                                                                    Tip 1: learn
                                                                                    how biometrics,
3 thInGs you Can Do noW                                                             passwords and
                                                                                    encryption can
 1. Save or backup documents to a shared network drive or the                       protect your laptops
    cloud, not a hard drive. Protect important files from computer                  and tablets here.
    crashes and laptop losses.
                                                                                    Tip 2: learn how
 2. encrypt Microsoft Word docs. encrypting a document is as
                               ®

                                                                                    to identify phishing
    simple as right clicking and selecting “encrypt”. why not enforce               scams with this
                                                                                    video from No Panic
    encryption?                                                                     Computing here.
 3. Advise employees of simple do’s and don’ts. Don’t leave it in a car,
    do carry it in a backpack, don’t fall for common phishing scams.                Tip 3: learn how
                                                                                    to avoid a common
                                                                                    security threat for
                                                                                    windows XP here.




                                                                               A GUIDE TO SECURING YOUR BUSINESS       13
11
                    Shut Out Hackers:
                    Secure Your Wireless network
                    Are you underestimating the security of your Wi-Fi network?




hackers love to Penetrate networks. make sure yours is secure.


Why It matters
To protect your business, it’s important to keep outsiders from accessing                                    Get quick tips on
your wi-Fi network. Don’t hold off on protecting your network; hackers are                                   working wirelessly,
                                                                                                             both in and out of
increasingly focusing on small- and medium-sized businesses. Fortunately, there                              the office.
are simple, low-effort things you can do now to improve network security.


What It Can Do For your BusIness
 •	 Protect your network from disruption, which can jeopardize
    confidential customer data, interfere with supply chain activities
    and result in lost revenue.
 •	 Keep your business compliant with canadian privacy regulations
    such as PiPeDA.
 •	 Give your mobile staff a secure way to access your network from public                learn from cisco in this video: what
    hotspots when travelling.                                                             are bots, Viruses, malware, spyware?



3 thInGs you Can Do noW                                                                                      7 considerations
                                                                                                             for your wireless
 1. change wireless router default settings and stop                                                         network for you
                                                                                                             to think about,
    broadcasting your network iD. click here to find out how.                                                courtesy of Focus
 2. Minimize signal leakage. move your router to the middle of the                                           research.
    office and turn it off if not in use for long periods of time.
 3. invest in a virtual private network (VPn) so that mobile workers
    can securely connect to your network from public wi-Fi hotspots                    want more?
    while on the road. click here for more information on VPn
                                                                                       click here for a quick lesson on wi-Fi
                                                                                       security with this free online class from
                                                                                       Hewlett-Packard.




                                                                                  A GUIDE TO SECURING YOUR BUSINESS                14
12
                  Make network Downtime
                  a Thing of the Past
                  How much revenue do you lose during internet outages?
                  What’s the impact to your reputation if your
                  POS system goes down?



keeP your Business uP and running when your Primary network goes down.


Why It matters
                                                                                                      How much is
Downtime for critical systems can mean huge revenue and productivity                                  network downtime
losses and impact your reputation. it pays to have a back-up plan when                                costing your
                                                                                                      business? Find out
your primary access to the internet goes down. wireless technology can                                with our Point of
help keep your business up and running.                                                               sale roi calculator
                                                                                                      and see how much
                                                                                                      you save with a
What It Can Do For your BusIness                                                                      secure wireless back
                                                                                                      up plan in place.
 •	 ensure continuous up-time for transactions, communications,
    enterprise applications and other critical systems.
 •	 Keep your business running during disease outbreaks, inclement                                    Find out how
                                                                                                      blinds To Go
    weather, or natural disasters.                                                                    addressed their
                                                                                                      need for a failover
 •	 Protect your reputation, customer confidence and employee morale.
                                                                                                      solution for their
                                                                                                      Pos systems.
3 thInGs you Can Do noW
 1. identify mission critical systems. understanding which systems
    require 100% uptime is the first step in building a back-up plan.
 2. Find out how much network downtime is really costing your
    business. self assessment tools can help you quantify how much
    downtime is costing your business so you can build the business
    case for a back-up network access solution.
                                                                                    see how critical network Access
 3. choose a back-up solution that includes network and carrier                     can help your business
    diversity. backing up a main wireline connection with wireless network
    access from another carrier significantly reduces your vulnerability.




                                                                             A GUIDE TO SECURING YOUR BUSINESS              15
13
                  Securing the cloud
                  Are you considering putting services in the cloud?




think aBout how to Protect your data BeFore you move it to the cloud.


Why It matters
                                                                                               check out this iT
cloud computing delivers on-demand, scalable resources accessible                              world canada white
from just about anywhere, through the internet. before moving aspects                          paper which examines
                                                                                               canadian companies and
of your business to the cloud, it’s a good idea to think about how to                          who is moving to the
keep your data secure once it’s there.                                                         cloud – as well as when
                                                                                               and why.

What It Can Do For your BusIness
                                                                                               Get insights from Price
 •	 Access the latest technology to stay agile and able to adapt to                            waterhouse coopers on
    changing business environments and security threats.                                       different cloud models
                                                                                               and how to secure them
 •	 Deliver on-demand self-service to employees without the risk.                              in this white paper.
 •	 expand what your company does and who you collaborate with.


3 thInGs you Can Do noW
 1. classify data based on how critical it is to your business. before                         check out this webcast
                                                                                               from www.techrepublic.
    you decide what data to move to the cloud, consider your risk                              com which covers the
    tolerance and legal or compliance responsibilities.                                        primary considerations
                                                                                               to protect your most
 2. Perform due diligence when choosing cloud suppliers.                                       precious assets in the
    Get references. research their audit process. negotiate a strong                           cloud.
    service level agreement (slA) that covers roles and responsibilities,
    data storage and disposal, and disaster recovery plans.
 3. Know where your data is living. if your cloud provider is not
    based in your country or province, the servers that store your data
    may be subject to the laws of another country. This could make your
    business noncompliant with local regulatory requirements or expose
    information to authorities in other jurisdictions.



                                                                            A GUIDE TO SECURING YOUR BUSINESS       16
14
                   i Spy:
                   Monitoring Your Business from Afar
                   M2M: How machines can help you keep an eye on your business.




remotely monitor and Protect staFF, Fleets and assets
with wirelessly connected machines.


Why It matters
                                                                                                 Find out how
you’ve probably heard the term machine-to-machine (m2m) being tossed                             Pita Pit used video
around with increasing frequency over the last year or two. These services                       surveillance to address
                                                                                                 an outbreak of inventory
let you remotely monitor and protect your fleet, assets and staff from your                      and cashier-related
smartphone or tablet, using wirelessly connected devices.                                        shrinkage at their stores.



What It Can Do For your BusIness
 •	 secure multiple warehouses, sites, vehicles, buildings or stores.                            see how Highway
                                                                                                 Technical engineering
 •	 reduce theft: know where your inventory, freight and assets are                              services monitors its
    at all times.                                                                                fleet and keeps mobile
                                                                                                 workers safe.
 •	 Keep remote workers safe and connected to security response teams.


3 thInGs you Can Do noW                                                                                 explore how
 1. connect your on-premise surveillance cameras to a mobile app                                        m2m can help
                                                                                                        you remotely
    to monitor you business from anywhere. see how Pita Pit used                                        monitor and
    video surveillance to reduce shrinkage here.                                                        secure your
                                                                                                        business.
 2. install fleet tracking systems in your vehicles to better track
    your valuable assets. see how Highway Technical engineering
    services monitors its fleet and keeps mobile workers safe here.
 3. Provide connected devices to field workers in hazardous
    conditions to monitor their safety. check out vendors like
    blackline GPs, Tsunami solutions and mentor engineering.




                                                                              A GUIDE TO SECURING YOUR BUSINESS           17
15
                   Protecting Against emerging Threats
                   What impact do social media networks, online games
                   or software have on security?




keeP in mind that emerging threats can From Both within
and outside oF your organization.


Why It matters
Although mobile malware is still in its early days, it’s smart to be aware
                                                                                                    learn about emerging
of emerging threats and the ways to defend against them. look ahead,                                threats and how they
keep informed and protect against the leaking of sensitive information to                           are impacting businesses
                                                                                                    here.
the public by employees. Prevent external scams delivered through social
media sites or repackaged games or software.


What It Can Do For your BusIness
                                                                                                    Get a view of what’s
 •	 Keep employees alert and prepared for the latest threats and                                    hitting the top 5
    educated on acceptable behaviour.                                                               cybercrimes and scams
                                                                                                    today here.
 •	 Keep networks and business devices safe from the latest
    cybercriminal threats.
 •	 increase the confidence of your customers, partners and staff
    in the security of their data.                                                                        Get informed
                                                                                                          commentary
                                                                                                          on emerging
3 thInGs you Can Do noW                                                                                   trends in attacks,
                                                                                                          malicious code
 1. create a policy to set expectations for social media users.                                           activity, phishing,
                                                                                                          and spam here.
    with social media malware on the rise, shaping user behaviour and
    increasing governance for social network use is a smart choice.
 2. install anti-malware software regularly. with the increasing
    speed of malware changes and distribution, it’s important to
    make sure anti-malware software on all business mobile devices is             want more?
    updated regularly.                                                            learn about the social media sites, and
                                                                                  hear what small and medium sized
 3. consider data loss prevention tools. Prevent inadvertent or                   businesses are doing to protect against
    intentional exposure of sensitive business information by identifying         emerging threats here.
    critical content then tracking and blocking it from being moved.


                                                                             A GUIDE TO SECURING YOUR BUSINESS                  18
Are YOu reADY?
STOP worrying. STArT now.

security should be a source of positive motivation, because good security is key to winning your
customer’s trust. This guide is filled with common sense (but often overlooked) things you can start
doing today.


stop worrying. mobile devices actually have many built-in security advantages over their desktop
predecessors. And, as seen in this guide, there are many available device features that can simply be
turned on, or resources that can be accessed for free.


so don’t delay. Try putting one new security idea into action today, or pick a few and build them into
your security plan.

For more information on mobile security, or other communications challenges for business, email us now,
or visit www.rogersbizresources.com.




references to third-party advice and websites are made for your information only. ™rogers, rocket & mobius Design plus and related
brands marks and logos are trade-marks of or used under license from rogers communications inc. or an affiliate. blackberry®, rim and
related names and logos are the property of research in motion limited and are registered and/or used in the u.s. and countries around
the world, used under license from research in motion limited. All other brand names are trade-marks of their respective owners.
©2011 rogers communications




                                                                                        A GUIDE TO SECURING YOUR BUSINESS                19

Contenu connexe

En vedette

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

En vedette (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Security Ebook Conceptual 0607cs13 2

  • 1.
  • 2. Securing your mobile success it’s time to sToP thinking about security as a reason to say ‘no’ and sTArT thinking about it as a reason to say ‘yes’. Advances in technology and mobility come at in this guide you’ll find 15 practical tips, us fast and furiously. successful businesses will suggestions and ideas you can implement right embrace the technologies that spur growth but now to help secure your business. if you want to also remain aware of potential risks and have a dig deeper, we offer links to many other sources of plan to deal with them. inspiration. it starts with understanding the many available Dive in now for ideas on how to securely harness security features and tools on the market. This will the power of mobility. help you make better decisions about the wireless technologies that are best for your business. A GUIDE TO SECURING YOUR BUSINESS 2
  • 3. 15 wAys To secure your business Practical Business security advice 1. what’s your organization’s mobile security iQ? » 2. Get educated: learn from other businesses » 3. Kickstart a new iT risk Attitude » device, aPP & network tiPs 4. Discover built-in blackberry Defenses » 5. beyond Pass-code lock: Keeping your iPhone and Data safe » 6. is Android secure enough for business? » 7. master mobile Device management » 8. securing Personal Devices at work » 9. Do you Know where Those Apps Go? » 10. Hit the road Jack: mobile computing made safe » 11. shut out Hackers: secure your wireless wi-Fi network » 12. make network Downtime a Thing of the Past » emerging technology tiPs 13. securing the cloud » 14. i spy: monitoring your business from Afar » 15. Protecting against emerging Threats » A GUIDE TO SECURING YOUR BUSINESS 3
  • 4. 1 What’s Your Organization’s Mobile Security iQ? How does your business rank when it comes to proactive security? don’t assume your Business is secure. Find out For sure. Why It matters Assessing the security risk of the technology, processes and people that support your business is the first step in securing your business. self assessment tools, like the ones to the right, are easy, fast and typically free. so why not start now? What It Can Do For your BusIness identify security risks and monitor your • Help you evaluate where your business stands and give you ideas ability to respond to threats in your on how to mitigate future risk. computing environment with Microsoft’s Security Assessment Tool. • identify the greatest risks to your business and prioritize which to tackle first. • create a “wake-up call” for your leadership team on risks and priorities. 3 thInGs you Can Do noW 1. Take the quiz. no matter what your score, you’ll find opportunity for improvement or reinforcement of what to keep doing. 2. Share the results with your staff to educate them on risks. 3. Build awareness with your leadership team. share your scores, including how you fared on existing security measures, to help get Find out how well your business is buy-in for future security proposals. protecting personal information and how compliant you are with mandatory regulations with this self assessment tool from the office of the Privacy commissioner of canada. A GUIDE TO SECURING YOUR BUSINESS 4
  • 5. 2 get educated: Learn from Other Businesses What are successful companies doing to protect their business? get security survey highlights and Practical moBile advice. Why It matters smart companies are becoming more proactive about security, deploying security processes and security tools to protect their business and gain a competitive edge. learn from them in the latest security research. What It Can Do For your BusIness • Fuel change – security best practices from other businesses can Get highlights from the 2010 cio security survey and practical mobile help motivate your leadership team to act now. security tips with this webinar from iT • Keep you focused on what matters – figure out where to focus world canada. your efforts and how to prioritize security initiatives. read this white paper • secure your business faster with practical ideas from companies for a realistic vision of like yours. how mobile security needs to be considered to help businesses grow 3 thInGs you Can Do noW 1. read free annual security reports – Take a look back at the past year and ahead to the threats we can expect. Access a full list of free reports from security companies, publishing organizations and Deep dive into security best practices with the iT research businesses here. 2012 Global state of 2. Subscribe to free ongoing security news e-blasts or blog posts – information security survey® from Price stay on top of the latest threats with expert advice from iT publishing waterhouse coopers. companies like iT world canada, Tech republic or cneT. 3. Be part of the conversation – security is a hot topic. now is the time to reach out to your network of tech colleagues or attend a mobile tech security event for advice. A GUIDE TO SECURING YOUR BUSINESS 5
  • 6. 3 Kickstart a new iT risk Attitude Your employees: responsible risk takers or data daredevils? Bring risk management out oF the it dePartment and into everyone’s joB. Why It matters Human error is the primary cause for security breaches in business today, yet most organizations provide little on-going security education to non-iT staff. with the rest of the company thinking risk and security is iT’s responsibility, it’s wise to consider making risk Find out how to make risk management everyone’s job. management more personal in your business with this blog post. What It Can Do For your BusIness • significantly increase the level of security in your business. • build a culture of security and responsibility. • Help your business be more proactive in new technology decisions. 3 thInGs you Can Do noW 1. Make all employees risk managers. Add accountability for risk management to performance goals for everyone across the company. learn about what global iT managers and 2. Build a comprehensive communication plan that teaches cios are doing to better mitigate risk with this Global risk study from ibm. employees about emerging threats, security policies, and best practices. 3. commit to ongoing risk management training. The lack of end-user training is a growing threat to iT security. want more? Get tips on how to help employees understand data risk management here » A GUIDE TO SECURING YOUR BUSINESS 6
  • 7. 4 Discover Built-in BlackBerry Defenses Your BlackBerry smartphone is a security powerhouse. Are you harnessing its power for good? get BlackBerry security tiPs and tricks straight From the Pros. Why It matters over the last decade, rim has built a sound reputation on the strength of its security features. This has much to do with business enterprise (bes) software. but even the best software doesn’t protect against ® uninformed or negligent blackberry users. implementing a few quick and easy safeguards can go a long way in securing your devices and the information on them. check out this webinar to find out more about blackberry built-in security tools. ® What It Can Do For your BusIness • Protect against unwanted applications and malware. • manage multiple devices on rim’s stable and secure operating system. want more? • Protect your sensitive data no matter how it’s accessed. check out the blackberry security ® knowledge base for a wealth of information on all aspects of security 3 thInGs you Can Do noW for blackberry devices. ® 1. Set a password policy with a minimum length of 5 characters and Get 5 tips from cio.com to keep your a maximum of 10 password tries before automatic device self wipe. blackberry smartphone safe here. ® click here to find out how to add a password to your smartphones. 2. encrypt data stored on your device and/or your microsD media card in four simple steps. click here to find out how. 3. Wipe devices before they are passed on to another employee. Go to the options menu on the device, select security, then security wipe. it will ask you to type in BlackBerry to complete the wipe. A GUIDE TO SECURING YOUR BUSINESS 7
  • 8. 5 Beyond Pass-code Lock: Keeping Your iPhone and Data Safe Have you thought beyond the basics? learn how to keeP inFormation secure on Business iPhones. Why It matters Apple has polished the business features of its operating system with security that stretches well beyond pass-code locks. From exchange and remote wipe support, security and configuration to VPn options and encryption, Apple users can now keep their iPhones and the data they ® access safe. Hear what Apple has to say What It Can Do For your BusIness about iPhone security in this ® on-demand webinar. • Provide a layered approach to keeping your information secure with device policies, restrictions and encryption. • Protect all data stored on devices with hardware encryption. • clear data and settings remotely in the event of loss or theft. 3 thInGs you Can Do noW 1. Manage iPhone through the central console. set up ® accounts, set restrictions, and configure devices quickly and remotely using iPhone 4’s console for mobile device ® management. click here to find out how. Get informed: everything you want to know about Apple’s security 2. Set up VPn access and teach your employees how to turn it on, features for iPhone here. ® so you can communicate private information securely over a public network. Get help on setting up VPn here. 3. get a security app. security apps can add another layer of protection for business, from biometric security apps that authenticate users with want more? the touch of a finger, to anti-malware or even alarms that protect your Get more security tips on how to secure device from theft or loss. your data from Apple here. A GUIDE TO SECURING YOUR BUSINESS 8
  • 9. 6 is Android Secure enough for Business? Did you know the latest Android devices are packed with better security features? get Better control and security over Personal and Business devices. Why It matters why should you care about Android ? employees are increasingly opting to ™ bring their personal devices to work. Android , Google’s operating system that ™ powers many of the world’s smartphones, gives you the ability to manage and secure a good portion of these devices from one simple operating system. Get security advice straight from Android™ in this on-demand webinar webinar here. What It Can Do For your BusIness • better control over personal and business mobile devices at work. • Access to a universe of third-party security solution providers who Get informed: can quickly custom build secure apps for your business on 5 things you Android’s open platform. should know about Android ™ • set-up, configure and perform frequent security updates with for business. relatively little effort using auto-discovery features. 3 thInGs you Can Do noW 1. Stop saying ‘no’ to personal devices. The last thing you want is want more? a rogue experience at your company. An informed iT department is the best way to ensure your business is secure. Get advice on how learn 6 ways to protect your Google phone here. to manage personal devices at work here. check out this essential guide to Android ™ 2. Adopt mobile device management (MDM). This is a critical part at work for business users here. of managing the plethora of Android devices, so take the time to ™ Get 10 tips to turn Android into a ™ chose features wisely. Get mDm advice here. business phone here. 3. use google apps to manage Android security policies. Google Apps Device Policy Administration can help you enforce policies and remotely wipe lost or stolen devices. A GUIDE TO SECURING YOUR BUSINESS 9
  • 10. 7 Master Mobile Device Management Are you managing mobile technology on the fly? centralize your control. minimize the risk. Why It matters Find out how mobile many businesses have a myriad of devices and operating systems accessing device management can benefit your company data. How prepared are you to manage yours? mobile device business with this management (mDm) tools are quickly becoming a must-have. not only can white paper from Juniper and they help centralize the control, security and costs of these devices, but they enterprise strategy can also minimize the time spent on maintenance. Group. What It Can Do For your BusIness This e-book is chock • manage assets, inventory management, software licenses, security full of juicy discussions controls, and more. on the latest trends in mobility. Topics covered • Quickly authenticate your staff, regardless of their device. include mobile device • speed up device and software deployment and reduce downtime by management and app development. skip to diagnosing and fixing problems remotely. page 70 for specific advice on device management tools. 3 thInGs you Can Do noW 1. Prioritize mobile device security and management needs. Figure 6, page 7 of Juniper’s whitepaper has a great list to get you started. 2. choose an integrated MDM solution instead of many individual tools. ideally it should integrate with network access controls, support all popular devices and cover the full life cycle of devices. check out these mDm players: Juniper, mobileiron and Trellia. 3. Mean what you say: enforce policy. monitor device usage, limiting or removing privileges where necessary, and blocking insecure sites or networks. A GUIDE TO SECURING YOUR BUSINESS 10
  • 11. 8 Securing Personal Devices at Work is it time for a Bring Your Own Device (BYOD) policy for your business? give your team the tools they need to securely access corPorate data From Personal smartPhones or taBlets. Why It matters Today’s workers are bringing their own personal smartphones, tablets and laptops to the office for both personal and professional use. many businesses have accepted this reality and are creating strategies that offer employees more freedom in exchange for a higher level of personal accountability. What It Can Do For your BusIness • Keep employees happy and productive while reducing cost of ownership for devices. Find out how your business can capitalize • support telecommuters and create a more flexible work on byoD in this webcast and white paper environment from unisys. • reduce unauthorized access to company data from staff-owned devices. 3 thInGs you Can Do noW want more? Get tips from unisys on developing a 1. Set clear expectations and policies. be clear about which byoD policy here. personal mobile devices are allowed in the workplace and how 7 questions you should answer before you you expect staff to keep these devices safe (managing passwords, implement byoD at your company. sybase. using only sanctioned apps etc.). see how smart companies are letting 2. invest in a mobile device management solution. retain control employees use their personal gadgets to and visibility over all devices from a central platform, installing do their jobs. wall street Journal. software that creates walls between corporate and personal data and enables data blocking or wiping. 3. revisit reimbursed policies. some companies are moving to a shared-responsibility model, implementing optional byoD policies and supporting them with grants, stipends, and loans. A GUIDE TO SECURING YOUR BUSINESS 11
  • 12. 9 Do You Know Where Those Apps go? got the latest must-have business app? How do you stop it from accessing off-limit data? make sure to include aPPs as Part oF your regular moBile security check. Why It matters Apps can pack a lot of power into your pocket. before inviting them in, make sure you know the full capabilities of these programs, including the amount of information they take from your employees’ devices. including apps as part Find out how mobile apps access personal data and explore security with this report of your regular mobile security check can help keep your business safe. from Lookout Security. What It Can Do For your BusIness • Prevent staff from unintentionally exposing your network and devices to viruses and hackers. • limit the downloading of malicious, pirated or repackaged applications from unofficial websites. • ensure that apps on business-used devices are not accessing sensitive business data without your permission or knowledge. watch this video from No Panic Computing to learn how to change Facebook privacy 3 thInGs you Can Do noW settings to stop it from accessing employee information. 1. Say ‘no’ to app permissions. Did you know nearly one third of apps in major apps stores access users’ locations? And an increasing number also access contacts? make sure users know when to say ‘no’ to apps that are requesting this kind of information access. 2. create a pool of approved apps. Define app download policies and make sure users only download (and update) approved software. 3. use application access control software. not all apps are what they seem. These tools look at how your device is behaving and, if it sees something suspicious, quarantines and even remote wipes it. A GUIDE TO SECURING YOUR BUSINESS 12
  • 13. 10 Hit the road Jack: Mobile computing Made Safe A few simple changes to the way you use mobile computers can go a long way in protecting your business. Protect your moBile devices and the inFormation they access From theFt. Why It matters your business is contained on your employees’ laptops, notebooks and tablets, yet the increasing complexity of technology, connectivity, security and confidentiality creates unprecedented risk. whenever sensitive data is stored outside firewalls or accessed through wi-Fi and remote networks, it’s smart to take added security measures to minimize risk. What It Can Do For your BusIness Get tips on how to make mobile computing safe in this on-demand • Help employees work safely from home or on the road. webcast. • Protect your business from theft of intellectual property or valuable devices. mobile Computing Video tips from no Panic Computing • limit access to important data to the intended user. Tip 1: learn how biometrics, 3 thInGs you Can Do noW passwords and encryption can 1. Save or backup documents to a shared network drive or the protect your laptops cloud, not a hard drive. Protect important files from computer and tablets here. crashes and laptop losses. Tip 2: learn how 2. encrypt Microsoft Word docs. encrypting a document is as ® to identify phishing simple as right clicking and selecting “encrypt”. why not enforce scams with this video from No Panic encryption? Computing here. 3. Advise employees of simple do’s and don’ts. Don’t leave it in a car, do carry it in a backpack, don’t fall for common phishing scams. Tip 3: learn how to avoid a common security threat for windows XP here. A GUIDE TO SECURING YOUR BUSINESS 13
  • 14. 11 Shut Out Hackers: Secure Your Wireless network Are you underestimating the security of your Wi-Fi network? hackers love to Penetrate networks. make sure yours is secure. Why It matters To protect your business, it’s important to keep outsiders from accessing Get quick tips on your wi-Fi network. Don’t hold off on protecting your network; hackers are working wirelessly, both in and out of increasingly focusing on small- and medium-sized businesses. Fortunately, there the office. are simple, low-effort things you can do now to improve network security. What It Can Do For your BusIness • Protect your network from disruption, which can jeopardize confidential customer data, interfere with supply chain activities and result in lost revenue. • Keep your business compliant with canadian privacy regulations such as PiPeDA. • Give your mobile staff a secure way to access your network from public learn from cisco in this video: what hotspots when travelling. are bots, Viruses, malware, spyware? 3 thInGs you Can Do noW 7 considerations for your wireless 1. change wireless router default settings and stop network for you to think about, broadcasting your network iD. click here to find out how. courtesy of Focus 2. Minimize signal leakage. move your router to the middle of the research. office and turn it off if not in use for long periods of time. 3. invest in a virtual private network (VPn) so that mobile workers can securely connect to your network from public wi-Fi hotspots want more? while on the road. click here for more information on VPn click here for a quick lesson on wi-Fi security with this free online class from Hewlett-Packard. A GUIDE TO SECURING YOUR BUSINESS 14
  • 15. 12 Make network Downtime a Thing of the Past How much revenue do you lose during internet outages? What’s the impact to your reputation if your POS system goes down? keeP your Business uP and running when your Primary network goes down. Why It matters How much is Downtime for critical systems can mean huge revenue and productivity network downtime losses and impact your reputation. it pays to have a back-up plan when costing your business? Find out your primary access to the internet goes down. wireless technology can with our Point of help keep your business up and running. sale roi calculator and see how much you save with a What It Can Do For your BusIness secure wireless back up plan in place. • ensure continuous up-time for transactions, communications, enterprise applications and other critical systems. • Keep your business running during disease outbreaks, inclement Find out how blinds To Go weather, or natural disasters. addressed their need for a failover • Protect your reputation, customer confidence and employee morale. solution for their Pos systems. 3 thInGs you Can Do noW 1. identify mission critical systems. understanding which systems require 100% uptime is the first step in building a back-up plan. 2. Find out how much network downtime is really costing your business. self assessment tools can help you quantify how much downtime is costing your business so you can build the business case for a back-up network access solution. see how critical network Access 3. choose a back-up solution that includes network and carrier can help your business diversity. backing up a main wireline connection with wireless network access from another carrier significantly reduces your vulnerability. A GUIDE TO SECURING YOUR BUSINESS 15
  • 16. 13 Securing the cloud Are you considering putting services in the cloud? think aBout how to Protect your data BeFore you move it to the cloud. Why It matters check out this iT cloud computing delivers on-demand, scalable resources accessible world canada white from just about anywhere, through the internet. before moving aspects paper which examines canadian companies and of your business to the cloud, it’s a good idea to think about how to who is moving to the keep your data secure once it’s there. cloud – as well as when and why. What It Can Do For your BusIness Get insights from Price • Access the latest technology to stay agile and able to adapt to waterhouse coopers on changing business environments and security threats. different cloud models and how to secure them • Deliver on-demand self-service to employees without the risk. in this white paper. • expand what your company does and who you collaborate with. 3 thInGs you Can Do noW 1. classify data based on how critical it is to your business. before check out this webcast from www.techrepublic. you decide what data to move to the cloud, consider your risk com which covers the tolerance and legal or compliance responsibilities. primary considerations to protect your most 2. Perform due diligence when choosing cloud suppliers. precious assets in the Get references. research their audit process. negotiate a strong cloud. service level agreement (slA) that covers roles and responsibilities, data storage and disposal, and disaster recovery plans. 3. Know where your data is living. if your cloud provider is not based in your country or province, the servers that store your data may be subject to the laws of another country. This could make your business noncompliant with local regulatory requirements or expose information to authorities in other jurisdictions. A GUIDE TO SECURING YOUR BUSINESS 16
  • 17. 14 i Spy: Monitoring Your Business from Afar M2M: How machines can help you keep an eye on your business. remotely monitor and Protect staFF, Fleets and assets with wirelessly connected machines. Why It matters Find out how you’ve probably heard the term machine-to-machine (m2m) being tossed Pita Pit used video around with increasing frequency over the last year or two. These services surveillance to address an outbreak of inventory let you remotely monitor and protect your fleet, assets and staff from your and cashier-related smartphone or tablet, using wirelessly connected devices. shrinkage at their stores. What It Can Do For your BusIness • secure multiple warehouses, sites, vehicles, buildings or stores. see how Highway Technical engineering • reduce theft: know where your inventory, freight and assets are services monitors its at all times. fleet and keeps mobile workers safe. • Keep remote workers safe and connected to security response teams. 3 thInGs you Can Do noW explore how 1. connect your on-premise surveillance cameras to a mobile app m2m can help you remotely to monitor you business from anywhere. see how Pita Pit used monitor and video surveillance to reduce shrinkage here. secure your business. 2. install fleet tracking systems in your vehicles to better track your valuable assets. see how Highway Technical engineering services monitors its fleet and keeps mobile workers safe here. 3. Provide connected devices to field workers in hazardous conditions to monitor their safety. check out vendors like blackline GPs, Tsunami solutions and mentor engineering. A GUIDE TO SECURING YOUR BUSINESS 17
  • 18. 15 Protecting Against emerging Threats What impact do social media networks, online games or software have on security? keeP in mind that emerging threats can From Both within and outside oF your organization. Why It matters Although mobile malware is still in its early days, it’s smart to be aware learn about emerging of emerging threats and the ways to defend against them. look ahead, threats and how they keep informed and protect against the leaking of sensitive information to are impacting businesses here. the public by employees. Prevent external scams delivered through social media sites or repackaged games or software. What It Can Do For your BusIness Get a view of what’s • Keep employees alert and prepared for the latest threats and hitting the top 5 educated on acceptable behaviour. cybercrimes and scams today here. • Keep networks and business devices safe from the latest cybercriminal threats. • increase the confidence of your customers, partners and staff in the security of their data. Get informed commentary on emerging 3 thInGs you Can Do noW trends in attacks, malicious code 1. create a policy to set expectations for social media users. activity, phishing, and spam here. with social media malware on the rise, shaping user behaviour and increasing governance for social network use is a smart choice. 2. install anti-malware software regularly. with the increasing speed of malware changes and distribution, it’s important to make sure anti-malware software on all business mobile devices is want more? updated regularly. learn about the social media sites, and hear what small and medium sized 3. consider data loss prevention tools. Prevent inadvertent or businesses are doing to protect against intentional exposure of sensitive business information by identifying emerging threats here. critical content then tracking and blocking it from being moved. A GUIDE TO SECURING YOUR BUSINESS 18
  • 19. Are YOu reADY? STOP worrying. STArT now. security should be a source of positive motivation, because good security is key to winning your customer’s trust. This guide is filled with common sense (but often overlooked) things you can start doing today. stop worrying. mobile devices actually have many built-in security advantages over their desktop predecessors. And, as seen in this guide, there are many available device features that can simply be turned on, or resources that can be accessed for free. so don’t delay. Try putting one new security idea into action today, or pick a few and build them into your security plan. For more information on mobile security, or other communications challenges for business, email us now, or visit www.rogersbizresources.com. references to third-party advice and websites are made for your information only. ™rogers, rocket & mobius Design plus and related brands marks and logos are trade-marks of or used under license from rogers communications inc. or an affiliate. blackberry®, rim and related names and logos are the property of research in motion limited and are registered and/or used in the u.s. and countries around the world, used under license from research in motion limited. All other brand names are trade-marks of their respective owners. ©2011 rogers communications A GUIDE TO SECURING YOUR BUSINESS 19