SlideShare une entreprise Scribd logo
1  sur  20
Mobile Security and how we take it for granted. By Patrick Vogel Image by Ciccioetneo on flickr
Smartphones and other mobile devices have become an integral part of our work and social lives, with 63% of students in 2010 using some sort of handheld device. Source: ECAR Image by rogersmj on flickr
These devices have become “remote controls for our lives,” through which we can communicate with friends and colleagues, take and store photos and videos, access social media sites, as well as a whole host of other things, all from the palms of our hands. Image by Public Domain Photos on flickr
However, these convenient devices are fraught with numerous security and privacy issues that many users are either not aware of, or choose to ignore. Image by chego101 on flickr
We seem to ignore the fact that we are literally carrying all of our personal information around in our pockets. If your Smartphone is misplaced or stolen, it only takes a few clicks or taps of a screen for someone to access your personal e-mails, (naughty) photos, social networking sites  (which keep you logged in for convenience), or even banking information. Photo by lululemon athletica on flickr
In addition to information that users knowingly put on their Smartphones, both Android phones and iPhones regularly transmit location info back to Google and Apple. On iPhones, a tracking file stores the latitude and longitude of cellphone towers and Wi-Fi access points with which the phone has interacted. Experts may also harvest call logs, map search results from the device’s Google Maps app and logs of what’s been typed into the iPhone’s virtual keyboard from the phone. Source: “Smartphone privacy threats no surprise to security experts”. By Patrick May and Troy Wolverton. Thestar.com, April 27th, 2011. Image by IvyMike on flickr.
These devices contain so much personal information, that smartphone forensics experts refer to them as “digital fingerprints.” Source: “Smartphone privacy threats no surprise to security experts”. By Patrick May and Troy Wolverton. Thestar.com, April 27th, 2011. Image by Phixaakh on flickr
Despite these risks, only 23% of Smartphone owners use the security software installed on their devices. Source: Trend Micro Inc. survey of 1,016 U.S. smartphone users, June 2009 Image by –JvL- on flickr
Most of us wouldn’t dream of operating our Mac or PC without a password and security software, so why doesn’t this caution apply to devices that fit in in the palm of our hand and can be lost in seconds? Photo by D’Arcy Norman on flickr
This relaxed attitude towards mobile security has become a major concern for businesses, which are struggling to keep up with the demands of securing these devices. Image by wwarby on flickr
The large variety of makes and platforms for Smartphones makes it difficult for companies’ IT consultants to uniformly secure important data on employees’ devices. Image by jurvetson on flickr
Another problem is that many employees see their mobile devices as something personal, and not something that IT should control. They see it as something that is “blue and plays music,” not something that needs to be secured. Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010.  Image by Yutaka Tsutano on flickr
Some companies have tried to combat this problem by purchasing standard Smartphones for their employees. However, even this does not stop workers from having “the company phone in their left pocket, and their personal phone in their right.” Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010.  Image by cambodiaforkidsorg on flickr
“Indeed, in a recent study of 300 companies in the U.S. and Europe by Good Technology Inc., a vendor of mobile security and management tools, nearly 80% of the respondents reported an increase in the number of employees who wanted to bring their own devices into the workplace in the past six to 12 months, and 28% reported a data breach because of an unauthorized device.”  Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010.  Image by meddygarnet on flickr
Since securing data is the sole responsibility of the company, there are a number of services available which allow businesses to centrally control password management, authentication authorization, strong encryption, inactivity timeout and remote wiping if a device is stolen or lost. Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010.  Image by CarbonNYC on flickr
A simple solution for individuals looking to keep their information secure is to enable passcode locking on your phone, and SIM card PIN access so that someone who has stolen or found your misplaced phone cannot access its data. Image by .schill on fiickr
If you are unhappy or concerned with the way that companies like Apple and Google track their devices locations, make yourself heard by voting with your dollar and purchasing a product from a company that does not invade their user’s privacy. Imabe by bfishadow on flickr
You should also be wary of mobile privacy when it comes to encounters with the police. Since Smartphones are such a new technology, there are still not clear laws regarding the legality of cellphone searches. So it is important to be cautious and know your rights. Source: “Smartphone Searches Not So Smart” Popular Mechanics, April 22nd, 2011.  Image by swiftmed on flickr
If you’re worried about your Smartphone or other mobile device’s security, don’t panic! Image by Nate Steiner on flickr
Do some research and find out what your options are for security and privacy. Then you can get back to your love affair with your mobile.

Contenu connexe

Tendances

Mobile security
Mobile securityMobile security
Mobile securityhome
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
The Ethics of Artificial Intelligence
The Ethics of Artificial IntelligenceThe Ethics of Artificial Intelligence
The Ethics of Artificial IntelligenceJohnSmith5466
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkRichard Common
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption disputeHaniAbdallah4
 
Digital Lifestyle Trends and Threats
Digital Lifestyle Trends and ThreatsDigital Lifestyle Trends and Threats
Digital Lifestyle Trends and ThreatsAndrew Wong
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsCraig Walker, CISSP
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkJahangirnagar University
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyFabrizio Gramuglio
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and BadTzar Umang
 
7 new assaults on data privacy
7 new assaults on data privacy7 new assaults on data privacy
7 new assaults on data privacyEntefy
 

Tendances (20)

Mobile security
Mobile securityMobile security
Mobile security
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
The Ethics of Artificial Intelligence
The Ethics of Artificial IntelligenceThe Ethics of Artificial Intelligence
The Ethics of Artificial Intelligence
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption dispute
 
Digital Lifestyle Trends and Threats
Digital Lifestyle Trends and ThreatsDigital Lifestyle Trends and Threats
Digital Lifestyle Trends and Threats
 
Apple vs. FBI
Apple vs. FBIApple vs. FBI
Apple vs. FBI
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Polinter11
Polinter11Polinter11
Polinter11
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacy
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
7 new assaults on data privacy
7 new assaults on data privacy7 new assaults on data privacy
7 new assaults on data privacy
 
Social engineering
Social engineeringSocial engineering
Social engineering
 

En vedette

Olympics - Let the Games Begin
Olympics - Let the Games BeginOlympics - Let the Games Begin
Olympics - Let the Games BeginCommPRO.biz
 
Webtalk 2ª Edição - Aula 5
Webtalk 2ª Edição - Aula 5Webtalk 2ª Edição - Aula 5
Webtalk 2ª Edição - Aula 5Daniel Simon
 
Intel AppUp Java Developer Guide
Intel AppUp Java Developer GuideIntel AppUp Java Developer Guide
Intel AppUp Java Developer GuideReadWrite
 

En vedette (6)

Olympics - Let the Games Begin
Olympics - Let the Games BeginOlympics - Let the Games Begin
Olympics - Let the Games Begin
 
TBLC Workshop Lunch & Learn - Utilizing the Cloud
TBLC Workshop Lunch & Learn - Utilizing the CloudTBLC Workshop Lunch & Learn - Utilizing the Cloud
TBLC Workshop Lunch & Learn - Utilizing the Cloud
 
Overview Intel AppUp developer program
Overview Intel AppUp developer programOverview Intel AppUp developer program
Overview Intel AppUp developer program
 
Webtalk 2ª Edição - Aula 5
Webtalk 2ª Edição - Aula 5Webtalk 2ª Edição - Aula 5
Webtalk 2ª Edição - Aula 5
 
Intel AppUp Java Developer Guide
Intel AppUp Java Developer GuideIntel AppUp Java Developer Guide
Intel AppUp Java Developer Guide
 
Elizabethan Group[1]
Elizabethan Group[1]Elizabethan Group[1]
Elizabethan Group[1]
 

Similaire à Mobile Security

Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Chelsea Porter
 
T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2Tanya Tighe, CRSP
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Aleque Juneau
 
The new dangers of the mobile world
The new dangers of the mobile worldThe new dangers of the mobile world
The new dangers of the mobile worldMark Tremblay
 
The new dangers of the mobile world
The new dangers of the mobile worldThe new dangers of the mobile world
The new dangers of the mobile worldMark Tremblay
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaksSocialKwan
 
Is it safe to bank on our phones?
Is it safe to bank on our phones?Is it safe to bank on our phones?
Is it safe to bank on our phones?Queen's University
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devicesJ A Bhavsar
 
Film flipbook mobilities
Film flipbook   mobilitiesFilm flipbook   mobilities
Film flipbook mobilitiesagoody
 
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)CR Group
 
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingCorporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingSignals Defense, LLC
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
 
Freedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile WorldFreedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile WorldJessie Helfrich
 
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docxSmartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docxwhitneyleman54422
 

Similaire à Mobile Security (20)

Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
Film project 2
Film project 2Film project 2
Film project 2
 
The new dangers of the mobile world
The new dangers of the mobile worldThe new dangers of the mobile world
The new dangers of the mobile world
 
The new dangers of the mobile world
The new dangers of the mobile worldThe new dangers of the mobile world
The new dangers of the mobile world
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Mobile Practice Management
Mobile Practice ManagementMobile Practice Management
Mobile Practice Management
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
Is it safe to bank on our phones?
Is it safe to bank on our phones?Is it safe to bank on our phones?
Is it safe to bank on our phones?
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 
Out-Smarted!
Out-Smarted!Out-Smarted!
Out-Smarted!
 
Film flipbook mobilities
Film flipbook   mobilitiesFilm flipbook   mobilities
Film flipbook mobilities
 
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
 
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingCorporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Freedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile WorldFreedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile World
 
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docxSmartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
 

Dernier

Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Pooja Nehwal
 
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...amitlee9823
 
Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...
Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...
Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...gajnagarg
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...amitlee9823
 
Top Rated Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men 🔝Muzaffarpur🔝 ...
➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men  🔝Muzaffarpur🔝  ...➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men  🔝Muzaffarpur🔝  ...
➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men 🔝Muzaffarpur🔝 ...amitlee9823
 
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...gajnagarg
 
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证tufbav
 
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...MOHANI PANDEY
 
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...amitlee9823
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...drmarathore
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制uodye
 
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammamahmedjiabur940
 
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...amitlee9823
 
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7shivanni mehta
 
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 

Dernier (20)

Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006
 
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
 
Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...
Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...
Just Call Vip call girls daman Escorts ☎️9352988975 Two shot with one girl (d...
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
 
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
Kothanur Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
 
Top Rated Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men 🔝Muzaffarpur🔝 ...
➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men  🔝Muzaffarpur🔝  ...➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men  🔝Muzaffarpur🔝  ...
➥🔝 7737669865 🔝▻ Muzaffarpur Call-girls in Women Seeking Men 🔝Muzaffarpur🔝 ...
 
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
 
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
 
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
 
Abortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get CytotecAbortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get Cytotec
 
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
 
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
 
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
 
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
 
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
 
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 

Mobile Security

  • 1. Mobile Security and how we take it for granted. By Patrick Vogel Image by Ciccioetneo on flickr
  • 2. Smartphones and other mobile devices have become an integral part of our work and social lives, with 63% of students in 2010 using some sort of handheld device. Source: ECAR Image by rogersmj on flickr
  • 3. These devices have become “remote controls for our lives,” through which we can communicate with friends and colleagues, take and store photos and videos, access social media sites, as well as a whole host of other things, all from the palms of our hands. Image by Public Domain Photos on flickr
  • 4. However, these convenient devices are fraught with numerous security and privacy issues that many users are either not aware of, or choose to ignore. Image by chego101 on flickr
  • 5. We seem to ignore the fact that we are literally carrying all of our personal information around in our pockets. If your Smartphone is misplaced or stolen, it only takes a few clicks or taps of a screen for someone to access your personal e-mails, (naughty) photos, social networking sites (which keep you logged in for convenience), or even banking information. Photo by lululemon athletica on flickr
  • 6. In addition to information that users knowingly put on their Smartphones, both Android phones and iPhones regularly transmit location info back to Google and Apple. On iPhones, a tracking file stores the latitude and longitude of cellphone towers and Wi-Fi access points with which the phone has interacted. Experts may also harvest call logs, map search results from the device’s Google Maps app and logs of what’s been typed into the iPhone’s virtual keyboard from the phone. Source: “Smartphone privacy threats no surprise to security experts”. By Patrick May and Troy Wolverton. Thestar.com, April 27th, 2011. Image by IvyMike on flickr.
  • 7. These devices contain so much personal information, that smartphone forensics experts refer to them as “digital fingerprints.” Source: “Smartphone privacy threats no surprise to security experts”. By Patrick May and Troy Wolverton. Thestar.com, April 27th, 2011. Image by Phixaakh on flickr
  • 8. Despite these risks, only 23% of Smartphone owners use the security software installed on their devices. Source: Trend Micro Inc. survey of 1,016 U.S. smartphone users, June 2009 Image by –JvL- on flickr
  • 9. Most of us wouldn’t dream of operating our Mac or PC without a password and security software, so why doesn’t this caution apply to devices that fit in in the palm of our hand and can be lost in seconds? Photo by D’Arcy Norman on flickr
  • 10. This relaxed attitude towards mobile security has become a major concern for businesses, which are struggling to keep up with the demands of securing these devices. Image by wwarby on flickr
  • 11. The large variety of makes and platforms for Smartphones makes it difficult for companies’ IT consultants to uniformly secure important data on employees’ devices. Image by jurvetson on flickr
  • 12. Another problem is that many employees see their mobile devices as something personal, and not something that IT should control. They see it as something that is “blue and plays music,” not something that needs to be secured. Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010. Image by Yutaka Tsutano on flickr
  • 13. Some companies have tried to combat this problem by purchasing standard Smartphones for their employees. However, even this does not stop workers from having “the company phone in their left pocket, and their personal phone in their right.” Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010. Image by cambodiaforkidsorg on flickr
  • 14. “Indeed, in a recent study of 300 companies in the U.S. and Europe by Good Technology Inc., a vendor of mobile security and management tools, nearly 80% of the respondents reported an increase in the number of employees who wanted to bring their own devices into the workplace in the past six to 12 months, and 28% reported a data breach because of an unauthorized device.” Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010. Image by meddygarnet on flickr
  • 15. Since securing data is the sole responsibility of the company, there are a number of services available which allow businesses to centrally control password management, authentication authorization, strong encryption, inactivity timeout and remote wiping if a device is stolen or lost. Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010. Image by CarbonNYC on flickr
  • 16. A simple solution for individuals looking to keep their information secure is to enable passcode locking on your phone, and SIM card PIN access so that someone who has stolen or found your misplaced phone cannot access its data. Image by .schill on fiickr
  • 17. If you are unhappy or concerned with the way that companies like Apple and Google track their devices locations, make yourself heard by voting with your dollar and purchasing a product from a company that does not invade their user’s privacy. Imabe by bfishadow on flickr
  • 18. You should also be wary of mobile privacy when it comes to encounters with the police. Since Smartphones are such a new technology, there are still not clear laws regarding the legality of cellphone searches. So it is important to be cautious and know your rights. Source: “Smartphone Searches Not So Smart” Popular Mechanics, April 22nd, 2011. Image by swiftmed on flickr
  • 19. If you’re worried about your Smartphone or other mobile device’s security, don’t panic! Image by Nate Steiner on flickr
  • 20. Do some research and find out what your options are for security and privacy. Then you can get back to your love affair with your mobile.