SlideShare une entreprise Scribd logo
1  sur  65
Mobile Devices: Control Issues,[object Object],Thomas TszWai Au,[object Object]
Definition of Mobile Devices,[object Object],Mobile phones with computer-like functionality or smartphones,[object Object],Laptops, netbooks, tablet computers,[object Object],Portable digital assistants (PDAs),[object Object],Portable universal serial bus (USB) devices for storage and for connectivity,[object Object],Radio frequency identification (RFID) devices for data storage, identification and asset management,[object Object],Infrared-enabled (IrDA) devices,[object Object]
Definition of Mobile Devices,[object Object],Mobile phones with computer-like functionality or smartphones,[object Object],Laptops, netbooks, tablet computers,[object Object],Portable digital assistants (PDAs),[object Object],Portable universal serial bus (USB) devices for storage and for connectivity,[object Object],Radio frequency identification (RFID) devices for data storage, identification and asset management,[object Object],Infrared-enabled (IrDA) devices,[object Object]
Definition of Mobile Devices,[object Object],Mobile phones with computer-like functionality or smartphones,[object Object],Laptops, netbooks, tablet computers,[object Object],Portable digital assistants (PDAs),[object Object],Portable universal serial bus (USB) devices for storage and for connectivity,[object Object],Radio frequency identification (RFID) devices for data storage, identification and asset management,[object Object],Infrared-enabled (IrDA) devices,[object Object]
Definition of Mobile Devices,[object Object],Mobile phones with computer-like functionality or smartphones,[object Object],Laptops, netbooks, tablet computers,[object Object],Portable digital assistants (PDAs),[object Object],Portable universal serial bus (USB) devices for storage and for connectivity,[object Object],Radio frequency identification (RFID) devices for data storage, identification and asset management,[object Object],Infrared-enabled (IrDA) devices,[object Object]
Definition of Mobile Devices,[object Object],Mobile phones with computer-like functionality or smartphones,[object Object],Laptops, netbooks, tablet computers,[object Object],Portable digital assistants (PDAs),[object Object],Radio frequency identification (RFID) devices for data storage, identification and asset management,[object Object],Infrared-enabled (IrDA) devices,[object Object],[object Object],[object Object]
Definition of Mobile Devices,[object Object],Mobile phones with computer-like functionality or smartphones,[object Object],Laptops, netbooks, tablet computers,[object Object],Portable digital assistants (PDAs),[object Object],Portable universal serial bus (USB) devices for storage and for connectivity,[object Object],Radio frequency identification (RFID) devices for data storage, identification and asset management,[object Object],Infrared-enabled (IrDA) devices,[object Object]
Current Environment,[object Object],Business Performance Management (BPM) Study:,[object Object],25% of all mobile devices used in the organizations are contain vital applications and information,[object Object],40% of the organizations do not manage mobile data tracking, backup, and archiving for regulatory purposes,[object Object],Only 32.4% of small businesses ($100 million in revenue and under) implement formal mobile compliance policies,[object Object],Source: Refer to references,[object Object]
Current Environment,[object Object],Business Performance Management (BPM) Study:,[object Object],40% of the organizations do not manage mobile data tracking, backup, and archiving for regulatory purposes,[object Object],Only 32.4% of small businesses ($100 million in revenue and under) implement formal mobile compliance policies,[object Object],[object Object],Source: Refer to references,[object Object]
Current Environment,[object Object],Business Performance Management (BPM) Study:,[object Object],25% of all mobile devices used in the organizations are contain vital applications and information,[object Object],Only 32.4% of small businesses ($100 million in revenue and under) implement formal mobile compliance policies,[object Object],[object Object],Source: Refer to references,[object Object]
Current Environment,[object Object],Business Performance Management (BPM) Study:,[object Object],25% of all mobile devices used in the organizations are contain vital applications and information,[object Object],40% of the organizations do not manage mobile data tracking, backup, and archiving for regulatory purposes,[object Object],Only 32.4% of small businesses ($100 million in revenue and under) implement formal mobile compliance policies,[object Object],Source: Refer to references,[object Object]
Current Environment,[object Object],Findings from 22nd AICPA Top Technology Initiative Survey and India Study:,[object Object],90% said the biggest challenge confronting IT professionals is the control and use of mobile devices,[object Object],No companies reported that improving data security is among their board’s top three priorities,[object Object],6% said they have an IT or data security committee,[object Object],47% said they have a Chief Information Security Officer,[object Object],50% have not implemented policies or systems to mitigate the threat,[object Object],Source: Refer to references,[object Object]
Current Environment,[object Object],Findings from 22nd AICPA Top Technology Initiative Survey and India Study:,[object Object],90% said the biggest challenge confronting IT professionals is the control and use of mobile devices,[object Object],6% said they have an IT or data security committee,[object Object],47% said they have a Chief Information Security Officer,[object Object],50% have not implemented policies or systems to mitigate the threat,[object Object],[object Object],Source: Refer to references,[object Object]
Current Environment,[object Object],Findings from 22nd AICPA Top Technology Initiative Survey and India Study:,[object Object],90% said the biggest challenge confronting IT professionals is the control and use of mobile devices,[object Object],No companies reported that improving data security is among their board’s top three priorities,[object Object],47% said they have a Chief Information Security Officer,[object Object],50% have not implemented policies or systems to mitigate the threat,[object Object],[object Object],Source: Refer to references,[object Object]
Current Environment,[object Object],Findings from 22nd AICPA Top Technology Initiative Survey and India Study:,[object Object],90% said the biggest challenge confronting IT professionals is the control and use of mobile devices,[object Object],No companies reported that improving data security is among their board’s top three priorities,[object Object],6% said they have an IT or data security committee,[object Object],47% said they have a Chief Information Security Officer,[object Object],50% have not implemented policies or systems to mitigate the threat,[object Object],Source: Refer to references,[object Object]
Current Environment,[object Object],Findings from 22nd AICPA Top Technology Initiative Survey and India Study:,[object Object],90% said the biggest challenge confronting IT professionals is the control and use of mobile devices,[object Object],No companies reported that improving data security is among their board’s top three priorities,[object Object],6% said they have an IT or data security committee,[object Object],47% said they have a Chief Information Security Officer,[object Object],[object Object],Source: Refer to references,[object Object]
Benefits,[object Object],Increased workforce productivity,[object Object],Improved customer service,[object Object],Improved turnaround times for problem resolutions,[object Object],Response to customer problems and questions,[object Object],Increased business process efficiency,[object Object],Improved employee security and safety,[object Object],Improved employee retention,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Benefits,[object Object],Increased workforce productivity,[object Object],Improved customer service,[object Object],Improved turnaround times for problem resolutions,[object Object],Response to customer problems and questions,[object Object],Increased business process efficiency,[object Object],Improved employee security and safety,[object Object],Improved employee retention,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Benefits,[object Object],Increased workforce productivity,[object Object],Improved customer service,[object Object],Improved turnaround times for problem resolutions,[object Object],Response to customer problems and questions,[object Object],Increased business process efficiency,[object Object],Improved employee security and safety,[object Object],Improved employee retention,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Benefits,[object Object],Increased workforce productivity,[object Object],Improved customer service,[object Object],Response to customer problems and questions,[object Object],Increased business process efficiency,[object Object],Improved employee security and safety,[object Object],Improved employee retention,[object Object],[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Benefits,[object Object],Increased workforce productivity,[object Object],Improved customer service,[object Object],Improved turnaround times for problem resolutions,[object Object],Response to customer problems and questions,[object Object],Increased business process efficiency,[object Object],Improved employee security and safety,[object Object],Improved employee retention,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Benefits,[object Object],Increased workforce productivity,[object Object],Improved customer service,[object Object],Improved turnaround times for problem resolutions,[object Object],Response to customer problems and questions,[object Object],Improved employee security and safety,[object Object],Improved employee retention,[object Object],[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Benefits,[object Object],Increased workforce productivity,[object Object],Improved customer service,[object Object],Improved turnaround times for problem resolutions,[object Object],Response to customer problems and questions,[object Object],Increased business process efficiency,[object Object],Improved employee retention,[object Object],[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Benefits,[object Object],Increased workforce productivity,[object Object],Improved customer service,[object Object],Improved turnaround times for problem resolutions,[object Object],Response to customer problems and questions,[object Object],Increased business process efficiency,[object Object],Improved employee security and safety,[object Object],Improved employee retention,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Risks,[object Object],Types of Risks:,[object Object],Financial,[object Object],Financial losses,[object Object],Legal & Regulatory,[object Object],Stolen confidential information,[object Object],Inaccurate reporting,[object Object],Vulnerabilities,[object Object],Loss, theft, and corruption of data or device,[object Object]
Risks,[object Object],Types of Risks:,[object Object],Financial,[object Object],Financial losses,[object Object],Legal & Regulatory,[object Object],Stolen confidential information,[object Object],Inaccurate reporting,[object Object],Vulnerabilities,[object Object],Loss, theft, and corruption of data or device,[object Object]
Risks,[object Object],Types of Risks:,[object Object],Financial,[object Object],Financial losses,[object Object],Legal & Regulatory,[object Object],Stolen confidential information,[object Object],Inaccurate reporting,[object Object],Vulnerabilities,[object Object],Loss, theft, and corruption of data or device,[object Object]
Risks,[object Object],Types of Risks:,[object Object],Financial,[object Object],Financial losses,[object Object],Legal & Regulatory,[object Object],Stolen confidential information,[object Object],Inaccurate reporting,[object Object],Vulnerabilities,[object Object],Loss, theft, and corruption of data or device,[object Object]
Risk Mitigation,[object Object],Update existing or create new mobile device strategies while considering the organizational culture, technology and governance as it will help ensure risks are appropriately accounted for and managed.,[object Object],Establish policies to support the mobile device strategy’s goals while leveraging available technology and mitigating risks.,[object Object],When introducing a mobile device, ensure it fits the corporate strategy and objectives by using a proven framework(i.e. COBIT).,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Mobile Device Strategy,[object Object],Should be tailored to address risks specific to the company.,[object Object],Consider the company’s:,[object Object],Technology,[object Object],Culture,[object Object],Governance,[object Object]
Mobile Device Policy,[object Object],Define allowable device types,[object Object],Defining the nature of services accessible through the devices,[object Object],Identifying the way people use the devices,[object Object],Integrating all enterprise-issued devices into an asset management program,[object Object],Describing the authentication and encryption needed on the devices,[object Object],Outlining the tasks for which employees may use the devices and the types of applications that are allowed,[object Object],Clarifying how data should be securely stored and transmitted,[object Object],Simple to implement and support,[object Object],Centrally managed by the company itself,[object Object],Flexible for administering users and devices,[object Object],Focused on hindering loss or theft,[object Object],Auditable in all of its parts,[object Object],Tested and verified in disaster response,[object Object],Attentive to possible external threats,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Proven Frameworks (COBIT),[object Object],Implementation is aligned with corporate strategy and objectives,[object Object],Value adding,[object Object],Risks are addressed,[object Object],Fits the corporate culture,[object Object],Compatible with users of the company,[object Object],Compatible with the technical architecture of the company,[object Object],External factors are considered,[object Object],Sufficient support with appropriate resources,[object Object],Monitored with appropriate performance metrics,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Proven Frameworks (COBIT),[object Object],Implementation is aligned with corporate strategy and objectives,[object Object],Value adding,[object Object],Risks are addressed,[object Object],Fits the corporate culture,[object Object],Compatible with users of the company,[object Object],Compatible with the technical architecture of the company,[object Object],External factors are considered,[object Object],Sufficient support with appropriate resources,[object Object],Monitored with appropriate performance metrics,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Proven Frameworks (COBIT),[object Object],Implementation is aligned with corporate strategy and objectives,[object Object],Value adding,[object Object],Risks are addressed,[object Object],Fits the corporate culture,[object Object],Compatible with users of the company,[object Object],Compatible with the technical architecture of the company,[object Object],External factors are considered,[object Object],Sufficient support with appropriate resources,[object Object],Monitored with appropriate performance metrics,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Proven Frameworks (COBIT),[object Object],Implementation is aligned with corporate strategy and objectives,[object Object],Value adding,[object Object],Risks are addressed,[object Object],Fits the corporate culture,[object Object],Compatible with users of the company,[object Object],Compatible with the technical architecture of the company,[object Object],External factors are considered,[object Object],Sufficient support with appropriate resources,[object Object],Monitored with appropriate performance metrics,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Proven Frameworks (COBIT),[object Object],Implementation is aligned with corporate strategy and objectives,[object Object],Value adding,[object Object],Risks are addressed,[object Object],Fits the corporate culture,[object Object],Compatible with users of the company,[object Object],Compatible with the technical architecture of the company,[object Object],External factors are considered,[object Object],Sufficient support with appropriate resources,[object Object],Monitored with appropriate performance metrics,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Proven Frameworks (COBIT),[object Object],Implementation is aligned with corporate strategy and objectives,[object Object],Value adding,[object Object],Risks are addressed,[object Object],Fits the corporate culture,[object Object],Compatible with users of the company,[object Object],Compatible with the technical architecture of the company,[object Object],External factors are considered,[object Object],Sufficient support with appropriate resources,[object Object],Monitored with appropriate performance metrics,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Proven Frameworks (COBIT),[object Object],Implementation is aligned with corporate strategy and objectives,[object Object],Value adding,[object Object],Risks are addressed,[object Object],Fits the corporate culture,[object Object],Compatible with users of the company,[object Object],Compatible with the technical architecture of the company,[object Object],External factors are considered,[object Object],Sufficient support with appropriate resources,[object Object],Monitored with appropriate performance metrics,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Proven Frameworks (COBIT),[object Object],Implementation is aligned with corporate strategy and objectives,[object Object],Value adding,[object Object],Risks are addressed,[object Object],Fits the corporate culture,[object Object],Compatible with users of the company,[object Object],Compatible with the technical architecture of the company,[object Object],External factors are considered,[object Object],Sufficient support with appropriate resources,[object Object],Monitored with appropriate performance metrics,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Proven Frameworks (COBIT),[object Object],Implementation is aligned with corporate strategy and objectives,[object Object],Value adding,[object Object],Risks are addressed,[object Object],Fits the corporate culture,[object Object],Compatible with users of the company,[object Object],Compatible with the technical architecture of the company,[object Object],External factors are considered,[object Object],Sufficient support with appropriate resources,[object Object],Monitored with appropriate performance metrics,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Proven Frameworks (COBIT),[object Object],Implementation is aligned with corporate strategy and objectives,[object Object],Value adding,[object Object],Risks are addressed,[object Object],Fits the corporate culture,[object Object],Compatible with users of the company,[object Object],Compatible with the technical architecture of the company,[object Object],External factors are considered,[object Object],Sufficient support with appropriate resources,[object Object],Monitored with appropriate performance metrics,[object Object],Source: ISACA – Securing Mobile Devices,[object Object]
Implications – Chartered Accountants (CAs),[object Object],CAs assess internal controls to determine the appropriate audit approach.,[object Object],Mobile devices pose risks to internal controls failing to achieve:,[object Object],Reliability on financial reporting,[object Object],Efficiency and effectiveness of its operations,[object Object],Compliance with laws and regulations,[object Object]
Implications – Chartered Accountants,[object Object],Procedures:,[object Object],Ensure that mobile device management software is running the latest approved software and patches,[object Object],Verify that mobile clients have protective features enabled if they are required by your mobile device security policy.,[object Object],Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device,[object Object],Evaluate the use of security monitoring software and processes,[object Object],Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices.,[object Object],Evaluate procedures in place for tracking end user trouble tickets,[object Object],Ensure that appropriate security policies are in place for your mobile devices,[object Object],Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen,[object Object],Evaluate whether effective change management processes exist,[object Object],Source: Davis, C., & Schiller, M.,[object Object]
Implications – Chartered Accountants,[object Object],Procedures:,[object Object],Ensure that mobile device management software is running the latest approved software and patches,[object Object],Verify that mobile clients have protective features enabled if they are required by your mobile device security policy.,[object Object],Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device,[object Object],Evaluate the use of security monitoring software and processes,[object Object],Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices.,[object Object],Evaluate procedures in place for tracking end user trouble tickets,[object Object],Ensure that appropriate security policies are in place for your mobile devices,[object Object],Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen,[object Object],Evaluate whether effective change management processes exist,[object Object],Source: Davis, C., & Schiller, M.,[object Object]
Implications – Chartered Accountants,[object Object],Procedures:,[object Object],Ensure that mobile device management software is running the latest approved software and patches,[object Object],Verify that mobile clients have protective features enabled if they are required by your mobile device security policy.,[object Object],Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device,[object Object],Evaluate the use of security monitoring software and processes,[object Object],Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices.,[object Object],Evaluate procedures in place for tracking end user trouble tickets,[object Object],Ensure that appropriate security policies are in place for your mobile devices,[object Object],Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen,[object Object],Evaluate whether effective change management processes exist,[object Object],Source: Davis, C., & Schiller, M.,[object Object]
Implications – Chartered Accountants,[object Object],Procedures:,[object Object],Ensure that mobile device management software is running the latest approved software and patches,[object Object],Verify that mobile clients have protective features enabled if they are required by your mobile device security policy.,[object Object],Evaluate the use of security monitoring software and processes,[object Object],Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices.,[object Object],Evaluate procedures in place for tracking end user trouble tickets,[object Object],Ensure that appropriate security policies are in place for your mobile devices,[object Object],Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen,[object Object],Evaluate whether effective change management processes exist,[object Object],[object Object],Source: Davis, C., & Schiller, M.,[object Object]
Implications – Chartered Accountants,[object Object],Procedures:,[object Object],Ensure that mobile device management software is running the latest approved software and patches,[object Object],Verify that mobile clients have protective features enabled if they are required by your mobile device security policy.,[object Object],Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device,[object Object],Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices.,[object Object],Evaluate procedures in place for tracking end user trouble tickets,[object Object],Ensure that appropriate security policies are in place for your mobile devices,[object Object],Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen,[object Object],Evaluate whether effective change management processes exist,[object Object],[object Object],Source: Davis, C., & Schiller, M.,[object Object]
Implications – Chartered Accountants,[object Object],Procedures:,[object Object],Ensure that mobile device management software is running the latest approved software and patches,[object Object],Verify that mobile clients have protective features enabled if they are required by your mobile device security policy.,[object Object],Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device,[object Object],Evaluate the use of security monitoring software and processes,[object Object],Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices.,[object Object],Evaluate procedures in place for tracking end user trouble tickets,[object Object],Ensure that appropriate security policies are in place for your mobile devices,[object Object],Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen,[object Object],Evaluate whether effective change management processes exist,[object Object],Source: Davis, C., & Schiller, M.,[object Object]
Implications – Chartered Accountants,[object Object],Procedures:,[object Object],Ensure that mobile device management software is running the latest approved software and patches,[object Object],Verify that mobile clients have protective features enabled if they are required by your mobile device security policy.,[object Object],Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device,[object Object],Evaluate the use of security monitoring software and processes,[object Object],Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices.,[object Object],Evaluate procedures in place for tracking end user trouble tickets,[object Object],Ensure that appropriate security policies are in place for your mobile devices,[object Object],Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen,[object Object],Evaluate whether effective change management processes exist,[object Object],Source: Davis, C., & Schiller, M.,[object Object]
Implications – Chartered Accountants,[object Object],Procedures:,[object Object],Ensure that mobile device management software is running the latest approved software and patches,[object Object],Verify that mobile clients have protective features enabled if they are required by your mobile device security policy.,[object Object],Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device,[object Object],Evaluate the use of security monitoring software and processes,[object Object],Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices.,[object Object],Evaluate procedures in place for tracking end user trouble tickets,[object Object],Ensure that appropriate security policies are in place for your mobile devices,[object Object],Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen,[object Object],Evaluate whether effective change management processes exist,[object Object],Source: Davis, C., & Schiller, M.,[object Object]
Implications – Chartered Accountants,[object Object],Procedures:,[object Object],Ensure that mobile device management software is running the latest approved software and patches,[object Object],Verify that mobile clients have protective features enabled if they are required by your mobile device security policy.,[object Object],Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device,[object Object],Evaluate the use of security monitoring software and processes,[object Object],Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices.,[object Object],Evaluate procedures in place for tracking end user trouble tickets,[object Object],Ensure that appropriate security policies are in place for your mobile devices,[object Object],Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen,[object Object],Evaluate whether effective change management processes exist,[object Object],Source: Davis, C., & Schiller, M.,[object Object]
Implications – Chartered Accountants,[object Object],Procedures:,[object Object],Ensure that mobile device management software is running the latest approved software and patches,[object Object],Verify that mobile clients have protective features enabled if they are required by your mobile device security policy.,[object Object],Determine the effectiveness of device security controls around protecting data when a hacker has physical access to the device,[object Object],Evaluate the use of security monitoring software and processes,[object Object],Verify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices.,[object Object],Evaluate procedures in place for tracking end user trouble tickets,[object Object],Ensure that appropriate security policies are in place for your mobile devices,[object Object],Evaluate the disaster recovery plan in place to restore mobile device access should a disaster happen,[object Object],[object Object],Source: Davis, C., & Schiller, M.,[object Object]
Implications – Chartered Accountants (CAs),[object Object],Consider the following items when confirming operational efficiency:,[object Object],Policy,[object Object],Antivirus updates,[object Object],Encryption,[object Object],Secure transmission,[object Object],Device management,[object Object],Access control,[object Object],Awareness training,[object Object],Risk,[object Object]
Implications – Chartered Accountants (CAs),[object Object],Consider the following items when confirming operational efficiency:,[object Object],Policy,[object Object],Antivirus updates,[object Object],Encryption,[object Object],Secure transmission,[object Object],Device management,[object Object],Access control,[object Object],Awareness training,[object Object],Risk,[object Object]
Implications – Chartered Accountants (CAs),[object Object],Consider the following items when confirming operational efficiency:,[object Object],Policy,[object Object],Antivirus updates,[object Object],Encryption,[object Object],Secure transmission,[object Object],Device management,[object Object],Access control,[object Object],Awareness training,[object Object],Risk,[object Object]
Implications – Chartered Accountants (CAs),[object Object],Consider the following items when confirming operational efficiency:,[object Object],Policy,[object Object],Antivirus updates,[object Object],Encryption,[object Object],Secure transmission,[object Object],Device management,[object Object],Access control,[object Object],Awareness training,[object Object],Risk,[object Object]
Implications – Chartered Accountants (CAs),[object Object],Consider the following items when confirming operational efficiency:,[object Object],Policy,[object Object],Antivirus updates,[object Object],Encryption,[object Object],Secure transmission,[object Object],Device management,[object Object],Access control,[object Object],Awareness training,[object Object],Risk,[object Object]
Implications – Chartered Accountants (CAs),[object Object],Consider the following items when confirming operational efficiency:,[object Object],Policy,[object Object],Antivirus updates,[object Object],Encryption,[object Object],Secure transmission,[object Object],Device management,[object Object],Access control,[object Object],Awareness training,[object Object],Risk,[object Object]
Implications – Chartered Accountants (CAs),[object Object],Consider the following items when confirming operational efficiency:,[object Object],Policy,[object Object],Antivirus updates,[object Object],Encryption,[object Object],Secure transmission,[object Object],Device management,[object Object],Access control,[object Object],Awareness training,[object Object],Risk,[object Object]
Implications – Chartered Accountants (CAs),[object Object],Consider the following items when confirming operational efficiency:,[object Object],Policy,[object Object],Antivirus updates,[object Object],Encryption,[object Object],Secure transmission,[object Object],Device management,[object Object],Access control,[object Object],Awareness training,[object Object],Risk,[object Object]
Implications – Chartered Accountants (CAs),[object Object],Consider the following items when confirming operational efficiency:,[object Object],Policy,[object Object],Antivirus updates,[object Object],Encryption,[object Object],Secure transmission,[object Object],Device management,[object Object],Access control,[object Object],Awareness training,[object Object],Risk,[object Object]
Conclusion,[object Object],Mobile devices has definitely enhanced availability, productivity, and efficiency of business processes. ,[object Object],However, the device and its data can be lost, corrupted, damaged, or stolen which may do harm to the exact items it was originally enhancing. ,[object Object],Many executives recognize there is a risk associated with these devices, but do not implement sufficient controls to mitigate the risks. ,[object Object],Recommendation:,[object Object],Develop a strategy to manage mobile devices,[object Object],Develop policies to support the strategy,[object Object],Use proven frameworks to assess IT technology when using or introducing new devices,[object Object]
References,[object Object],All music  used were attained from: http://www.partnersinrhyme.com/pir/free_music_loops.shtml,[object Object],AICPA. (2011, February 15). Surging Business Use of Mobile Devices is Top Business IT Challenge; AICPA Survey. Retrieved May 5, 2011, from AICPA: http://www.aicpa.org/PRESS/PRESSRELEASES/2011/Pages/2011TopTechnologySurvey.aspx ,[object Object],Blank, P. (2010, July 2). Compliance concerns delay banks introducing iPhone trading. Retrieved May 5, 2011, from Finextra: http://www.finextra.com/community/fullblog.aspx?blogid=4236,[object Object],Brenner, B. (2006, October 20). Infected iPods a threat to corporate networks. Retrieved May 5, 2011, from SearchSecurityChannel.com: http://searchsecurity.techtarget.com/news/1225559/Infected-iPods-a-threat-to-corporate-networks,[object Object],Cobb, M. (2009, January 8). Can USB compromise the security of an embedded mobile device? Retrieved May 5, 2011, from SearchSecurity.com: http://searchsecurity.techtarget.com/answer/Can-USB-compromise-the-security-of-an-embedded-mobile-device,[object Object],Computer Security Update. (2007, January 1). Mobile Devices Expose Firms to Compliance/Security Risks. Computer Security Update: Vol. 8. Issue. 1.,[object Object],COSO. (n.d.). Internal Control - Integrated Framework. Retrieved June 30, 2011, from COSO.org: http://www.coso.org/IC-IntegratedFramework-summary.htm,[object Object],Davis, C., & Schiller, M. (2011, April 12). 10 Steps for Auditing Mobile Computing Security. Retrieved May 5, 2011, from Enterprise Systems: http://esj.com/Articles/2011/04/12/IT-Auditing-Mobile-Security.aspx?p=1,[object Object],Expert Names Top 10 Audit Issues of 2009. (2009). Retrieved May 5, 2011, from InternetNews.com: http://www.internetnews.com/government/article.php/3819156/Expert-Names-Top-10-Audit-Issues-of-2009.htm,[object Object],Fell, J. (2011, April 19). Mobile devices and the law: What are the legal issues? Retrieved May 5, 2011, from computing.co.uk: http://www.computing.co.uk/ctg/feature/2044628/mobile-devices-law,[object Object]
References,[object Object],Gupta, U. (2011, June 6). How Effective are Mobile Security Policies? Retrieved June 8, 2011, from Bank Info Security: http://blogs.bankinfosecurity.asia/posts.php?postID=967,[object Object],Hernacki, B. (2006). Improving Bluetooth Security: What IT Managers and Mobile Device Users Can do. Information Security Journal. Vol 15. Issue 4. , 39-42.,[object Object],ISACA. (n.d.). COBIT - IT Governance Framework. Retrieved June 30, 2011, from ISACA: http://www.isaca.org/Knowledge-Center/COBIT/Pages/Overview.aspx,[object Object],ISACA. (2011, June 1). ISACA Survey: IT Leaders in India Believe Mobile Devices Pose Serious Risk to Enterprises. Retrieved June 7, 2011, from Asia Pulse Pty Ltd.: http://proquest.umi.com.proxy.lib.uwaterloo.ca/pqdweb?index=5&did=2363825061&SrchMode=2&sid=2&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1307655836&clientId=16746 ,[object Object],ISACA. (2010). Securing Mobile Devices. An ISACA Emerging Technology White Paper , 1-10.,[object Object],Juniper Networks. (2011, January). Mobile Device Security - Emerging Threats, Essential Strategies: Key Capabilities for Safeguarding Mobile Devices and Corporate Assets. Retrieved May 5, 2011, from Juniper Networks: http://www.juniper.net/us/en/local/pdf/whitepapers/2000372-en.pdf,[object Object],Levick, R. S. (2011, May 3). Sony's Cyberattack and How Companies Fail in Data Security. Retrieved May 5, 2011, from FastCompany.com: http://www.fastcompany.com/1751318/directors-are-disengaged-on-data-security,[object Object],Parizo, E. (2008, April 7). HP: Would you like some malware with your server? Retrieved May 5, 2011, from IT Knowledge Exchange: http://itknowledgeexchange.techtarget.com/security-bytes/hp-would-you-like-some-malware-with-your-server/,[object Object],Vijayan, J. (2011, March 29). BP employee loses laptop containing data on 13,000 oil spill claimants. Retrieved May 5, 2011, from ComputerWorld: http://www.computerworld.com/s/article/9215316/BP_employee_loses_laptop_containing_data_on_13_000_oil_spill_claimants,[object Object],White, M. (2010, June 30). Drunk oil trader banned and fined. Retrieved May 5, 2011, from finextra: http://www.finextra.com/news/fullstory.aspx?newsitemid=21554,[object Object]
IT Mobile Devices and Control Issues

Contenu connexe

Tendances

International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryCompTIA
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryCompTIA
 
Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...TELKOMNIKA JOURNAL
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB
 
Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareChromeInfo Technologies
 
CompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary FinalCompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary FinalAssespro Nacional
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannFrank Siepmann
 

Tendances (7)

International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand Summary
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East Summary
 
Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
 
Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in Healthcare
 
CompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary FinalCompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary Final
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
 

En vedette

Maria Dahlman Ström - Final Thesis
Maria Dahlman Ström - Final ThesisMaria Dahlman Ström - Final Thesis
Maria Dahlman Ström - Final ThesisMaria Dahlman Ström
 
David Ramos 11.14
David Ramos 11.14David Ramos 11.14
David Ramos 11.14David Ramos
 
돌아와요아저씨『SX797』『СOM』온라인카지노
돌아와요아저씨『SX797』『СOM』온라인카지노돌아와요아저씨『SX797』『СOM』온라인카지노
돌아와요아저씨『SX797』『СOM』온라인카지노ghjdfsg
 
스포츠배팅 ''SX797.COM'' 개경주전략
스포츠배팅 ''SX797.COM'' 개경주전략스포츠배팅 ''SX797.COM'' 개경주전략
스포츠배팅 ''SX797.COM'' 개경주전략ghjdfsg
 
მე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერება
მე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერებამე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერება
მე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერებაKhatushka Gvritishvili
 
Cách làm gối ôm hình gấu trúc
Cách làm gối ôm hình gấu trúcCách làm gối ôm hình gấu trúc
Cách làm gối ôm hình gấu trúcBibiyeu Qx
 

En vedette (11)

Maria Dahlman Ström - Final Thesis
Maria Dahlman Ström - Final ThesisMaria Dahlman Ström - Final Thesis
Maria Dahlman Ström - Final Thesis
 
Jacobs Law, LLC
Jacobs Law, LLCJacobs Law, LLC
Jacobs Law, LLC
 
Citysearch com
Citysearch comCitysearch com
Citysearch com
 
David Ramos 11.14
David Ramos 11.14David Ramos 11.14
David Ramos 11.14
 
돌아와요아저씨『SX797』『СOM』온라인카지노
돌아와요아저씨『SX797』『СOM』온라인카지노돌아와요아저씨『SX797』『СOM』온라인카지노
돌아와요아저씨『SX797』『СOM』온라인카지노
 
스포츠배팅 ''SX797.COM'' 개경주전략
스포츠배팅 ''SX797.COM'' 개경주전략스포츠배팅 ''SX797.COM'' 개경주전략
스포츠배팅 ''SX797.COM'' 개경주전략
 
მე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერება
მე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერებამე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერება
მე 4 ჯგუფი პეტრე უმიკაშვილიდა ზეპირსიტყვიერება
 
Cách làm gối ôm hình gấu trúc
Cách làm gối ôm hình gấu trúcCách làm gối ôm hình gấu trúc
Cách làm gối ôm hình gấu trúc
 
პრეზენტაცია
პრეზენტაციაპრეზენტაცია
პრეზენტაცია
 
Exposicion cct torax
Exposicion cct toraxExposicion cct torax
Exposicion cct torax
 
Russell westbrook
Russell westbrookRussell westbrook
Russell westbrook
 

Similaire à IT Mobile Devices and Control Issues

Driving Value to the Next Generation Supply Chain through Technology - What N...
Driving Value to the Next Generation Supply Chain through Technology - What N...Driving Value to the Next Generation Supply Chain through Technology - What N...
Driving Value to the Next Generation Supply Chain through Technology - What N...Richard Sebastian
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trendsSatya Harish
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
HIPAA Compliance for Pediatric Practices
HIPAA Compliance for Pediatric PracticesHIPAA Compliance for Pediatric Practices
HIPAA Compliance for Pediatric PracticesPaul Vanchiere, MBA
 
RFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim BloedauRFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim BloedauHIMSS
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?Lumension
 
Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governancejkllee
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governancejkllee
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
Using RFID to Track Tools and Equipment
Using RFID to Track Tools and EquipmentUsing RFID to Track Tools and Equipment
Using RFID to Track Tools and EquipmentImpinj RFID
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Lumension
 
RFID in APAC
RFID in APACRFID in APAC
RFID in APACkumarpg
 
Transforming Pharmacovigilance from Operational to Scientifically Driven
Transforming Pharmacovigilance from Operational to Scientifically DrivenTransforming Pharmacovigilance from Operational to Scientifically Driven
Transforming Pharmacovigilance from Operational to Scientifically DrivenVeeva Systems
 
The Roadmap to a Best-In-Class Safety Strategy
The Roadmap to a Best-In-Class Safety StrategyThe Roadmap to a Best-In-Class Safety Strategy
The Roadmap to a Best-In-Class Safety StrategyRemedy Interactive
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 

Similaire à IT Mobile Devices and Control Issues (20)

Driving Value to the Next Generation Supply Chain through Technology - What N...
Driving Value to the Next Generation Supply Chain through Technology - What N...Driving Value to the Next Generation Supply Chain through Technology - What N...
Driving Value to the Next Generation Supply Chain through Technology - What N...
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
HIPAA Compliance for Pediatric Practices
HIPAA Compliance for Pediatric PracticesHIPAA Compliance for Pediatric Practices
HIPAA Compliance for Pediatric Practices
 
RFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim BloedauRFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim Bloedau
 
Digital POV-Chemical Industries
Digital POV-Chemical IndustriesDigital POV-Chemical Industries
Digital POV-Chemical Industries
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
 
Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governance
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governance
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
Using RFID to Track Tools and Equipment
Using RFID to Track Tools and EquipmentUsing RFID to Track Tools and Equipment
Using RFID to Track Tools and Equipment
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...
 
RFID in APAC
RFID in APACRFID in APAC
RFID in APAC
 
Transforming Pharmacovigilance from Operational to Scientifically Driven
Transforming Pharmacovigilance from Operational to Scientifically DrivenTransforming Pharmacovigilance from Operational to Scientifically Driven
Transforming Pharmacovigilance from Operational to Scientifically Driven
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
The Roadmap to a Best-In-Class Safety Strategy
The Roadmap to a Best-In-Class Safety StrategyThe Roadmap to a Best-In-Class Safety Strategy
The Roadmap to a Best-In-Class Safety Strategy
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 

Dernier

3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
Protein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxProtein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxvidhisharma994099
 
10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdfJayanti Pande
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashasashalaycock03
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
Over the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptxOver the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptxraviapr7
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlDr. Bruce A. Johnson
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxCapitolTechU
 

Dernier (20)

Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
Protein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxProtein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptx
 
10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sasha
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
Over the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptxOver the counter (OTC)- Sale, rational use.pptx
Over the counter (OTC)- Sale, rational use.pptx
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting Bl
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
 

IT Mobile Devices and Control Issues

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.