SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Secure the data, not the device
Risky business - balancing BYOD risk with mobility
Increased productivity
Lower cost to the company
Flexibility
Technology Familiarity
Support of many different devices
No control over what is on device
Increase attack surface
Device Disparities
BYOD improves productivity.
• BYOD support average nearly three hours of
productivity gains per week.
BYOD promotes business agility.
• BYOD helps employees collaborate more
quickly, efficiently and creatively.
BYOD responds to employee demand.
• Supporting users’ own devices can be a
recruitment selling point.
Risky business - balancing BYOD risk with mobility
Risky business - balancing BYOD risk with mobility
Security enforcement.
• BYOD creates more weak links that can be
exploited both internally and externally.
• Requires significant user education and buy-in.
Management and governance.
• Without governance arrangements, BYOD can
quickly run out of control.
• IT to actively collaborate across the organization
to identify workable solutions.
Direct and indirect costs.
• BYOD often reduces device acquisition costs.
Can increase direct costs associated with
network infrastructure and complexity
Secure foundations – 7 points to building a BYOD security plan
1. Identify the risk elements that BYOD introduces
• Measure how the risk can impact your business
• Map the risk elements to regulations
2. Form a working group to embrace BYOD and understand the risks, including:
• Business stakeholders, IT stakeholders, Information security stakeholders
3. Decide how to enforce policies for devices connecting to your network
• Mobile devices (smartphones) Tablets (e.g., iPad) Portable computers (laptops, netbooks,
ultrabooks)
4. Build a project plan to include these capabilities:
• Remote device management, Application control,
• Data and device encryption, Wiping devices when retired
• Revoking access to devices when end-user relationship changes from employee to guest
Secure foundations – 7 points to building a BYOD security plan
5. Evaluate solutions
• Consider the impact on your existing network
• Consider how to enhance existing technologies prior to next step
6. Implement solutions
• Begin with a pilot group from each of the stakeholders' departments
• Expand pilot to departments based on your organizational criteria
• Open BYOD program to all employees
7. Periodically reassess solutions
• Include vendors and trusted advisors
• Look at roadmaps entering your next assessment period
• Consider cost-saving group plans if practical
In 2013 Cybercriminals made use of some exceptionally sophisticated methods to infect mobile
devices.
Infecting legal web resources helps spread mobile malware via popular websites - water holes.
Distribution via alternative app stores. There are numerous app stores containing programs that
cannot be found in Google Play.
Distribution via botnets. Bots self-proliferate by sending out text messages with a malicious link
to addresses in the victim’s address book.
Criminals are increasingly using obfuscation, the deliberate act of creating complex code to make
it difficult to analyse.
Cybercriminals also exploiting the Android Master Key vulnerability and have learned to embed
unsigned executable files in Android installation packages.
Cyber crime
Threats from mobile devices
Trend of the year: mobile banking
Trojans
2013 was marked by a rapid rise in
the number of Android banking
Trojans
Threats from mobile devices
Collects information about the smartphone (IMEI, country, service provider, operating system
language)
Acquires logins and passwords to online banking accounts, and bank card information
Extorts money from users by threatening to block the smartphone
Monitors SMS messages and information about voice calls.
Threats from mobile devices
Today, the majority of banking Trojan attacks affect users in Russia and the CIS. The
cybercriminals’ interest in user bank accounts, the activity of mobile banking Trojans is expected
to grow in other countries in 2014.
Infections caused by mobile banking programs
Countries where users face the greatest risk of mobile malware infection
Mobile spyware, such as MobileSpy and FlexiSpy, is on the rise.
In the BYOD context these spyware applications pose a huge threat because they can be
installed surreptitiously on an employee’s phone and used for industrial or corporate espionage.
The mobile phone is also a fully functional network device. When connected to the company
Wi-Fi, has the ability to probe the network for vulnerabilities and assets.
Mobile Spyware, BYOD and Corporate Espionage
Mobile Spyware, BYOD and Corporate Espionage
Mobile Spyware, BYOD and Corporate Espionage
Recap
THANK YOU

Contenu connexe

Tendances

4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
ijmnct
 

Tendances (19)

Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Web application firewall solution market
Web application firewall solution marketWeb application firewall solution market
Web application firewall solution market
 
Mobile security
Mobile securityMobile security
Mobile security
 
The Internet of things paradox
The Internet of things paradoxThe Internet of things paradox
The Internet of things paradox
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
Humming Heads Presentation
Humming Heads PresentationHumming Heads Presentation
Humming Heads Presentation
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firm
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
 

Similaire à BYOD - Secure the data, not the device

Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
rebelreg
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
kostikjaylonshaewe47
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
Francisco Anes
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
pdevang
 

Similaire à BYOD - Secure the data, not the device (20)

Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
Security attacks taxonomy on
Security attacks taxonomy onSecurity attacks taxonomy on
Security attacks taxonomy on
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
 
Malware Improvements in Android OS
Malware Improvements in Android OSMalware Improvements in Android OS
Malware Improvements in Android OS
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Mobile Security Threats In Organisations: 4 Challenges To Navigate And Solve
Mobile Security Threats In Organisations: 4 Challenges To Navigate And SolveMobile Security Threats In Organisations: 4 Challenges To Navigate And Solve
Mobile Security Threats In Organisations: 4 Challenges To Navigate And Solve
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
 

Dernier

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Dernier (20)

TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 

BYOD - Secure the data, not the device

  • 1. Secure the data, not the device
  • 2. Risky business - balancing BYOD risk with mobility Increased productivity Lower cost to the company Flexibility Technology Familiarity Support of many different devices No control over what is on device Increase attack surface Device Disparities
  • 3. BYOD improves productivity. • BYOD support average nearly three hours of productivity gains per week. BYOD promotes business agility. • BYOD helps employees collaborate more quickly, efficiently and creatively. BYOD responds to employee demand. • Supporting users’ own devices can be a recruitment selling point. Risky business - balancing BYOD risk with mobility
  • 4. Risky business - balancing BYOD risk with mobility Security enforcement. • BYOD creates more weak links that can be exploited both internally and externally. • Requires significant user education and buy-in. Management and governance. • Without governance arrangements, BYOD can quickly run out of control. • IT to actively collaborate across the organization to identify workable solutions. Direct and indirect costs. • BYOD often reduces device acquisition costs. Can increase direct costs associated with network infrastructure and complexity
  • 5. Secure foundations – 7 points to building a BYOD security plan 1. Identify the risk elements that BYOD introduces • Measure how the risk can impact your business • Map the risk elements to regulations 2. Form a working group to embrace BYOD and understand the risks, including: • Business stakeholders, IT stakeholders, Information security stakeholders 3. Decide how to enforce policies for devices connecting to your network • Mobile devices (smartphones) Tablets (e.g., iPad) Portable computers (laptops, netbooks, ultrabooks) 4. Build a project plan to include these capabilities: • Remote device management, Application control, • Data and device encryption, Wiping devices when retired • Revoking access to devices when end-user relationship changes from employee to guest
  • 6. Secure foundations – 7 points to building a BYOD security plan 5. Evaluate solutions • Consider the impact on your existing network • Consider how to enhance existing technologies prior to next step 6. Implement solutions • Begin with a pilot group from each of the stakeholders' departments • Expand pilot to departments based on your organizational criteria • Open BYOD program to all employees 7. Periodically reassess solutions • Include vendors and trusted advisors • Look at roadmaps entering your next assessment period • Consider cost-saving group plans if practical
  • 7. In 2013 Cybercriminals made use of some exceptionally sophisticated methods to infect mobile devices. Infecting legal web resources helps spread mobile malware via popular websites - water holes. Distribution via alternative app stores. There are numerous app stores containing programs that cannot be found in Google Play. Distribution via botnets. Bots self-proliferate by sending out text messages with a malicious link to addresses in the victim’s address book. Criminals are increasingly using obfuscation, the deliberate act of creating complex code to make it difficult to analyse. Cybercriminals also exploiting the Android Master Key vulnerability and have learned to embed unsigned executable files in Android installation packages. Cyber crime
  • 9. Trend of the year: mobile banking Trojans 2013 was marked by a rapid rise in the number of Android banking Trojans Threats from mobile devices
  • 10. Collects information about the smartphone (IMEI, country, service provider, operating system language) Acquires logins and passwords to online banking accounts, and bank card information Extorts money from users by threatening to block the smartphone Monitors SMS messages and information about voice calls. Threats from mobile devices
  • 11. Today, the majority of banking Trojan attacks affect users in Russia and the CIS. The cybercriminals’ interest in user bank accounts, the activity of mobile banking Trojans is expected to grow in other countries in 2014. Infections caused by mobile banking programs
  • 12. Countries where users face the greatest risk of mobile malware infection
  • 13. Mobile spyware, such as MobileSpy and FlexiSpy, is on the rise. In the BYOD context these spyware applications pose a huge threat because they can be installed surreptitiously on an employee’s phone and used for industrial or corporate espionage. The mobile phone is also a fully functional network device. When connected to the company Wi-Fi, has the ability to probe the network for vulnerabilities and assets. Mobile Spyware, BYOD and Corporate Espionage
  • 14. Mobile Spyware, BYOD and Corporate Espionage
  • 15. Mobile Spyware, BYOD and Corporate Espionage