Mobile device security Practical advice on how to keep your mobile device and the data on it safe.

Slides:



Advertisements
Similar presentations
ATK Space 9617 Distribution Avenue San Diego, California Tel: (858) Fax: (858) Website:
Advertisements

How to protect yourself, your computer, and others on the internet
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Security for Mobile Devices
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
HELP US HELP YOU: MAKING YOUR MOBILE DEVICE WORK FOR YOU IT Pro Name Company Name Date Note: Consider having one of your execs present this with you to.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
7 Effective Habits when using the Internet Philip O’Kane 1.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
 Smartphone overview › Platform comparison  App Construction  Smartphone malware and viruses  Security threats  Keeping your Smartphone clean.
Internet Fraud By: Noelle Woodman.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Phone Trivia McKay Fackrell PLAY. What is the current operating system for Apple? Question one iOS Apple 8 OS X Lion OS X Yosemite.
Internet safety By Lydia Snowden.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Sophos Mobile Security
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
IT Security for Users By Matthew Moody.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Google Wallet By: Amanda Tazbaz ITMG 10. How it works ● Download application on Android smartphone ● Set up payment information ● Shop in store ● Click.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
The rising standards of EU Mobile Payments October 2015 Jeremy King, International Director.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Mobile Device Security Threats Christina Blakley Host Computer Security.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Mobile Operating Systems
Hotspot Shield Protect Your Online Identity
Personal spaces.
What this activity will show you
Multifactor Authentication
Enrolling Two-Factor Authentication (2FA)
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Staying Austin College
Digital $$ Quiz Test your knowledge.
Industry Best Practices – Security For Smartphones / Mobile Devices
Security in mobile technologies
What this activity will show you
Presentation transcript:

Mobile device security Practical advice on how to keep your mobile device and the data on it safe

Air, water, food… mobile devices Mobile devices are now an integral part of our lives

“If a smartphone lives up to what it should be then it is something, as human beings, we will have an emotional relationship with because it's there all the time, it's our window on the world, it's our mouthpiece, it's everything we are and have. ‘My life is in there’ you hear people scream.” – Stephen Fry My life is in there

So how did we get here? Mobile devices are developing quicker than ever before: 1 st cell phone call st person-to- person SMS message st internet use on a cell phone st Windows tablet PC launched st BlackBerry launched st iPhone launched st Android OS launched between 1 st cell phone call and 1 st SMS years 6 between 1 st SMS and 1 st internet use on a cell phone years 1 year between 1st iPhone and 1st Android OS

Blurring the home-work boundaries Accessing personal websites from work devices Reading work s on personal devices Accessing corporate systems outside the office Whoever owns the device, with smartphones and tablets the boundaries between personal and work use merge.

Work from any location Work at any time Reduced operating costs People prefer them Greater productivity Greater flexibility Increased response times Happier staff The benefits of mobile devices at work

Lost or stolen devices Mobile malware (e.g. viruses) Data loss Financial theft But it’s not all good news Which in turn lead to: Mobile security risks include: Lost or stolen devices Mobile malware (e.g. viruses) Data loss Financial theft

Lost or stolen devices Unattended device Unauthorized access Data theft

Mobile malware 2010: Google removed banking malware that had gathered information on more than 1m Android users 2011: Zeus malware for Android steals financial data But it will be come a major threat in the future. Mobile malware (e.g. malicious apps, Trojans etc.) is still in its infancy. But it does exist and the focus is on data theft:

Data = £ $ € ¥ Criminals can convert data to money in many different ways: Bank details Steal money Make fraudulent purchases Sell to other criminals addresses Sell to spammers Personal identities Make fraudulent purchases Sell to other criminals Company data Blackmail Sell to other parties Steal money Make fraudulent purchases Sell to other criminals Sell to spammers Make fraudulent purchases Sell to other criminals Blackmail Sell to other parties

Your contacts? Your work s? Your bank account? Your online store accounts? Your company’s data? Your holiday plans? Your photos? Your contacts? Your work s? Your bank account? Your online store accounts? Your company’s data? Your holiday plans? Your photos? How secure are your devices? If your personal or work devices fell into the wrong hands, what could people access?

How to secure your mobile... and your life As a basic rule, consider your device like your computer

For individuals Secure your device Always lock it Apply a complex passcode Shield your passcode Apply the latest patches Prevent malware infection Don’t click on unsolicited links Think before downloading apps Be data aware Be careful what you share Encrypt sensitive data Stay compliant Always lock it Apply a complex passcode Shield your passcode Apply the latest patches Don’t click on unsolicited links Think before downloading apps Be careful what you share Encrypt sensitive data Know and follow your organization’s security policies Don’t “jailbreak” or “root”

For organizations Define what’s OK: devices, OS, versions Get visibility of connected devices and data usage Secure the device: require passcodes, control apps, remote management Secure access Create mobile security policy Deal with lost or stolen phones Enable the user to manage their own device Define what’s OK: devices, OS, versions Get visibility of connected devices and data usage Secure the device: require passcodes, control apps, remote management Secure access Create mobile security policy Deal with lost or stolen phones Enable the user to manage their own device

Near Field Contact (NFC) The digital wallet Augmented reality Watch this space! Near Field Contact (NFC) The digital wallet Augmented reality Watch this space! What’s next for mobile devices?