SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
3 simple steps to tackle the
basics of mobile security
Did you know
The implementation of “bring
your own device” (BYOD)
programmes in workplaces
was expected to rise to
45% by 2020.
http://www.telegraph.co.uk/technology/mobile-phones/10029908/Half-of-all-Britons-to-provide-their-own-
smartphones-and-tablets-at-work.html
45%
Did you know
90% of employees used their
personal smartphones for
work-related purposes in the
past year.
http://www.cmswire.com/cms/information-management/byod-alert-personal-smartphones-heavily-used-for-work-
company-compensation-or-security-not-so-much-020185.php
A 2013 study reported that
57% of employers agreed
that employees use personal
devices without consent.
Did you know
http://www.businesszone.co.uk/topic/staff/employers-guide-bring-your-own-device-part-one/53026
Did you know
1 in 4 in the UK have had their
phone stolen or lost.
http://www.symantec.com/en/uk/about/news/release/article.jsp?prid=20130404_01
Did you know
http://www.slideshare.net/ArrowECSMarketing/symantec-appcenter-webinarpptx
Exploding Number of Mobile Devices
Pave the Way for “Bring Your Own Device” (BYOD)
2015 246m corp PCs
2010 177M corp PCs
2015 293M personal PCs
2010 173M personal PCs
2015 10.17M smartphones
2010 300M smartphones
2015 326M tablets
2010 15M tablets
2,170%69%39% 340%
Did you know
99% of mobile malware targeted
Android devices in 2013.
http://newsroom.cisco.com/release/1310011/Cisco-Annual-Security-Report-Documents-Unprecedented-Growth-of-
Advanced-Attacks-and-Malicious-Traffic
Common security problems
•	Loss of company data and files from
memory-laden devices.
•	Physical loss of the device.
•	Introduction of viruses and malware
into the company’s installed computer
base, usually when synchronising PC and
handset in the office and on a home PC.
•	Secure the mobile device
•	Secure the mobile data
•	Secure the mobile applications
How can you address them?
Security Methods
There are three main steps to tackle
the basics of mobile security
•	Authentication
•	Encryption
•	Filtering
Learn more by reading on...
What is Authentication?
The process of identifying an individual,
usually based on a username and
password.
Users have to identify themselves to
their device and to the network before
they can gain access.
What is Authentication?
•	Mobile devices often do not have
passwords enabled.
•	Mobile devices often lack passwords
to authenticate users and control
access to data stored on devices.
What is Authentication?
Many devices have the technical
capability to support authentication
- passwords, PIN numbers, pattern
screen locks, and biometric readers.
However users often don’t use
these mechanisms, or devices aren’t
configured correctly.
What is Authentication?
If users use passwords or PINS they
tend to use passwords that are easy
for others to guess i.e. their birthdays
or 1234 etc.
What is Authentication?
The issue with static passwords is
that they can be guessed, forgotten,
written down or stolen.
Without secure passwords devices
that are lost or stolen are prone to
having unauthorised users accessing
and using sensitive information.
What is Authentication?
Two factor authentication is often
ignored when conducting sensitive
transactions on mobile devices.
Two factor authentication provides a
higher level of security than traditional
passwords and PINs. Users are required
to authenticate using two different
factors.
What is Encryption?
A method of converting an original
message of regular text into encoded
text. Sensitive data is encoded while
stored and during transmission.
Use encryption to help secure your
files and prevent other people from
viewing or changing them.
Why Encryption?
•	Data encryption helps to secure
stored or transmitted data.
•	Many mobile devices have the ability
to enable data encryption with little
impact to the user.
Why Encryption?
The use of encryption helps limit the
attackers’ ability to obtain usable data
from the mobile device’s storage.
It will also prevent them from being
able to easily capture sensitive data
(such as user names and passwords).
What is Filtering?
Filtering is a term that encompasses
methods of removing threats to mobile
security from web pages and emails.
Web pages are often used as carriers of
viruses and other malware.
Email attachments are also a primary
transporter of malware attacks.
Next Steps
Improve
•	Authentication
•	Encryption
•	Filtering
NOW
!
Next Steps
Run a Vulnerability
Assessment
Carry out a Security Audit
Next Steps: Authentication
•	Ensure passwords, PIN numbers,
pattern screen locks, and biometric
readers are enabled to authenticate
users and access to data.
•	Make sure mobile devices avoid
insecure passwords and PINs.
•	Avoid writing passwords down.
Next Steps: Authentication
•	Emphasise to employees the
importance of not losing devices.
•	Consider two factor authentication.
•	Implement a Mobile Strong
Authentication strategy.
Next Steps: Encryption
•	Create and maintain encrypted
backups to ensure resiliency if a
device becomes faulty or is lost or
stolen.
•	For Cloud-based mobile devices,
backups can be done remotely
whenever an Internet connection is
available.
Next Steps: Encryption
•	Mobile device backups should be
done and password protected while
it is still in the control of the user.
•	Implement a Mobile Encryption
Model.
Next Steps: Filtering
Use Spam filtering to help prevent
spam, phishing attacks and unsolicited
e-mail messages from reaching your
email server.
This blocks spam on an external server
instead of simply placing it in a “junk
e-mail” folder. This keeps viruses and
spyware out of your system.
Next Steps: Filtering
Install regular security updates to
protect yourself against viruses. Use
Antivirus software on all machines.
Ensure that all your systems are
updated in order to protect you from
future online threats.
How do you manage your policies?
 
Do you have ever-changing policies?
Are they time consuming to manage?
Next Steps
Keltec work with many technology
vendors who are experts in designing
BYOD security solutions and in BYOD
security policies.
Next Steps
By investing in total system security
management, businesses will be able
to insure themselves against the
increasing and inevitable use of mobile
devices in the workplace.
Next Steps
Download our FREE white paper
Download Now
The Impact of Mobile Devices
on the Security of Corporate
IT Systems
Want to discuss any of the issues in
this presentation? Contact us at
keltec.co.uk/it-services/security

Contenu connexe

Tendances

Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint TechnologyQualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint TechnologyFIDO Alliance
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesDenim Group
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerProduct of Things
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...Dataconomy Media
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
IoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresIoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresUITSEC Teknoloji A.Ş.
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 

Tendances (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
IoT Security Challenges
IoT Security ChallengesIoT Security Challenges
IoT Security Challenges
 
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint TechnologyQualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
Qualcomm ® Snapdragon Sense ™ ID 3D Fingerprint Technology
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
IoT security
IoT securityIoT security
IoT security
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
IoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresIoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructures
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 

En vedette

Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKirill Kertsenbaum
 
Mobile security new challenges practical solutions
Mobile security new challenges practical solutionsMobile security new challenges practical solutions
Mobile security new challenges practical solutionsInterop
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...Information Security Awareness Group
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issuesommerville-videos
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 

En vedette (7)

Kaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISHKaspersky Security For Virtualization - ENGLISH
Kaspersky Security For Virtualization - ENGLISH
 
Mobile security new challenges practical solutions
Mobile security new challenges practical solutionsMobile security new challenges practical solutions
Mobile security new challenges practical solutions
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Security & App Development - CSO Summit Mid 2014
Security & App Development - CSO Summit Mid 2014Security & App Development - CSO Summit Mid 2014
Security & App Development - CSO Summit Mid 2014
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 

Similaire à 3 steps security

Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
MUC -Summary - Lessons.docx
MUC -Summary - Lessons.docxMUC -Summary - Lessons.docx
MUC -Summary - Lessons.docxssuser4c58f5
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionVTECH SOLUTION
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistJignesh Solanki
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 

Similaire à 3 steps security (20)

Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Secure End User
Secure End UserSecure End User
Secure End User
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
MUC -Summary - Lessons.docx
MUC -Summary - Lessons.docxMUC -Summary - Lessons.docx
MUC -Summary - Lessons.docx
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Smartphones' Security
Smartphones' SecuritySmartphones' Security
Smartphones' Security
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security Protection
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 

Dernier

Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15SearchNorwich
 
Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxelizabethella096
 
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Onlineanilsa9823
 
Social Media Marketing PPT-Includes Paid media
Social Media Marketing PPT-Includes Paid mediaSocial Media Marketing PPT-Includes Paid media
Social Media Marketing PPT-Includes Paid mediaadityabelde2
 
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptxDigital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptxZACGaming
 
How to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setupsHow to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setupsssuser4571da
 
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best StrategiesGoogle 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best StrategiesSearch Engine Journal
 
BLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly BulletinBLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly BulletinBalmerLawrie
 
Uncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsUncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsVWO
 
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Factors-Influencing-Branding-Strategies.pptx
Factors-Influencing-Branding-Strategies.pptxFactors-Influencing-Branding-Strategies.pptx
Factors-Influencing-Branding-Strategies.pptxVikasTiwari846641
 
The+State+of+Careers+In+Retention+Marketing-2.pdf
The+State+of+Careers+In+Retention+Marketing-2.pdfThe+State+of+Careers+In+Retention+Marketing-2.pdf
The+State+of+Careers+In+Retention+Marketing-2.pdfSocial Samosa
 
Situation Analysis | Management Company.
Situation Analysis | Management Company.Situation Analysis | Management Company.
Situation Analysis | Management Company.DanielaQuiroz63
 

Dernier (20)

Creator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose GuirgisCreator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
 
Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...
Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...
Top 5 Breakthrough AI Innovations Elevating Content Creation and Personalizat...
 
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
 
Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptx
 
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Hazratganj Lucknow best sexual service Online
 
The Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison KaltmanThe Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison Kaltman
 
Social Media Marketing PPT-Includes Paid media
Social Media Marketing PPT-Includes Paid mediaSocial Media Marketing PPT-Includes Paid media
Social Media Marketing PPT-Includes Paid media
 
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
 
Digital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew RupertDigital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew Rupert
 
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptxDigital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptx
 
How to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setupsHow to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setups
 
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best StrategiesGoogle 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
 
BLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly BulletinBLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
 
Uncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsUncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 Reports
 
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
 
Factors-Influencing-Branding-Strategies.pptx
Factors-Influencing-Branding-Strategies.pptxFactors-Influencing-Branding-Strategies.pptx
Factors-Influencing-Branding-Strategies.pptx
 
The+State+of+Careers+In+Retention+Marketing-2.pdf
The+State+of+Careers+In+Retention+Marketing-2.pdfThe+State+of+Careers+In+Retention+Marketing-2.pdf
The+State+of+Careers+In+Retention+Marketing-2.pdf
 
Foundation First - Why Your Website and Content Matters - David Pisarek
Foundation First - Why Your Website and Content Matters - David PisarekFoundation First - Why Your Website and Content Matters - David Pisarek
Foundation First - Why Your Website and Content Matters - David Pisarek
 
No Cookies No Problem - Steve Krull, Be Found Online
No Cookies No Problem - Steve Krull, Be Found OnlineNo Cookies No Problem - Steve Krull, Be Found Online
No Cookies No Problem - Steve Krull, Be Found Online
 
Situation Analysis | Management Company.
Situation Analysis | Management Company.Situation Analysis | Management Company.
Situation Analysis | Management Company.
 

3 steps security

  • 1. 3 simple steps to tackle the basics of mobile security
  • 2. Did you know The implementation of “bring your own device” (BYOD) programmes in workplaces was expected to rise to 45% by 2020. http://www.telegraph.co.uk/technology/mobile-phones/10029908/Half-of-all-Britons-to-provide-their-own- smartphones-and-tablets-at-work.html 45%
  • 3. Did you know 90% of employees used their personal smartphones for work-related purposes in the past year. http://www.cmswire.com/cms/information-management/byod-alert-personal-smartphones-heavily-used-for-work- company-compensation-or-security-not-so-much-020185.php
  • 4. A 2013 study reported that 57% of employers agreed that employees use personal devices without consent. Did you know http://www.businesszone.co.uk/topic/staff/employers-guide-bring-your-own-device-part-one/53026
  • 5. Did you know 1 in 4 in the UK have had their phone stolen or lost. http://www.symantec.com/en/uk/about/news/release/article.jsp?prid=20130404_01
  • 6. Did you know http://www.slideshare.net/ArrowECSMarketing/symantec-appcenter-webinarpptx Exploding Number of Mobile Devices Pave the Way for “Bring Your Own Device” (BYOD) 2015 246m corp PCs 2010 177M corp PCs 2015 293M personal PCs 2010 173M personal PCs 2015 10.17M smartphones 2010 300M smartphones 2015 326M tablets 2010 15M tablets 2,170%69%39% 340%
  • 7. Did you know 99% of mobile malware targeted Android devices in 2013. http://newsroom.cisco.com/release/1310011/Cisco-Annual-Security-Report-Documents-Unprecedented-Growth-of- Advanced-Attacks-and-Malicious-Traffic
  • 8. Common security problems • Loss of company data and files from memory-laden devices. • Physical loss of the device. • Introduction of viruses and malware into the company’s installed computer base, usually when synchronising PC and handset in the office and on a home PC.
  • 9. • Secure the mobile device • Secure the mobile data • Secure the mobile applications How can you address them?
  • 10. Security Methods There are three main steps to tackle the basics of mobile security • Authentication • Encryption • Filtering Learn more by reading on...
  • 11. What is Authentication? The process of identifying an individual, usually based on a username and password. Users have to identify themselves to their device and to the network before they can gain access.
  • 12. What is Authentication? • Mobile devices often do not have passwords enabled. • Mobile devices often lack passwords to authenticate users and control access to data stored on devices.
  • 13. What is Authentication? Many devices have the technical capability to support authentication - passwords, PIN numbers, pattern screen locks, and biometric readers. However users often don’t use these mechanisms, or devices aren’t configured correctly.
  • 14. What is Authentication? If users use passwords or PINS they tend to use passwords that are easy for others to guess i.e. their birthdays or 1234 etc.
  • 15. What is Authentication? The issue with static passwords is that they can be guessed, forgotten, written down or stolen. Without secure passwords devices that are lost or stolen are prone to having unauthorised users accessing and using sensitive information.
  • 16. What is Authentication? Two factor authentication is often ignored when conducting sensitive transactions on mobile devices. Two factor authentication provides a higher level of security than traditional passwords and PINs. Users are required to authenticate using two different factors.
  • 17. What is Encryption? A method of converting an original message of regular text into encoded text. Sensitive data is encoded while stored and during transmission. Use encryption to help secure your files and prevent other people from viewing or changing them.
  • 18. Why Encryption? • Data encryption helps to secure stored or transmitted data. • Many mobile devices have the ability to enable data encryption with little impact to the user.
  • 19. Why Encryption? The use of encryption helps limit the attackers’ ability to obtain usable data from the mobile device’s storage. It will also prevent them from being able to easily capture sensitive data (such as user names and passwords).
  • 20. What is Filtering? Filtering is a term that encompasses methods of removing threats to mobile security from web pages and emails. Web pages are often used as carriers of viruses and other malware. Email attachments are also a primary transporter of malware attacks.
  • 22. Next Steps Run a Vulnerability Assessment Carry out a Security Audit
  • 23. Next Steps: Authentication • Ensure passwords, PIN numbers, pattern screen locks, and biometric readers are enabled to authenticate users and access to data. • Make sure mobile devices avoid insecure passwords and PINs. • Avoid writing passwords down.
  • 24. Next Steps: Authentication • Emphasise to employees the importance of not losing devices. • Consider two factor authentication. • Implement a Mobile Strong Authentication strategy.
  • 25. Next Steps: Encryption • Create and maintain encrypted backups to ensure resiliency if a device becomes faulty or is lost or stolen. • For Cloud-based mobile devices, backups can be done remotely whenever an Internet connection is available.
  • 26. Next Steps: Encryption • Mobile device backups should be done and password protected while it is still in the control of the user. • Implement a Mobile Encryption Model.
  • 27. Next Steps: Filtering Use Spam filtering to help prevent spam, phishing attacks and unsolicited e-mail messages from reaching your email server. This blocks spam on an external server instead of simply placing it in a “junk e-mail” folder. This keeps viruses and spyware out of your system.
  • 28. Next Steps: Filtering Install regular security updates to protect yourself against viruses. Use Antivirus software on all machines. Ensure that all your systems are updated in order to protect you from future online threats.
  • 29. How do you manage your policies?   Do you have ever-changing policies? Are they time consuming to manage? Next Steps
  • 30. Keltec work with many technology vendors who are experts in designing BYOD security solutions and in BYOD security policies. Next Steps
  • 31. By investing in total system security management, businesses will be able to insure themselves against the increasing and inevitable use of mobile devices in the workplace. Next Steps
  • 32. Download our FREE white paper Download Now The Impact of Mobile Devices on the Security of Corporate IT Systems
  • 33. Want to discuss any of the issues in this presentation? Contact us at keltec.co.uk/it-services/security