Tips on Securing Mobile Devices October 5, 2012 Preston Wiley, Network Security Manager, CISSP Mike Hill, Project Manager / Systems Analyst, CISSP.

Slides:



Advertisements
Similar presentations
UNDERSTANDING YOUR DEVICE (GADGET). A new, often expensive, and relatively unknown hardware device or accessory that makes your life easier or more.
Advertisements

Mobile Applications and Time Management Deanna Arbuckle, MRC, CRC University of Dayton
M OBILE D EVICE D EPLOYMENT ( I P ADS ) AND BYOD P OLICY Presented by Tyler Wallace.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Security for Mobile Devices
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Smart Phones and Tablets: Security Issues S. Roy 1.
Working Smarter: Using Smart Phones & Mobile Work Dino Martinez Student Involvement & Leadership Development.
Mobile Devices. Definitions Smartphones are phone first, enhanced to do things formerly reserved for PCs Tablets embody those enhanced computing features.
Mobile Protection Overview
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
WHAT IS ANDROID? A Software platform and operating system for mobile. Based on the Linux kernel. Android was found way back in It was developed.
Choosing the right device, right tools and control access for mobile devices.
Mobile Gadget Roundup A look at some popular devices legal professionals use to get work done.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Objectives Overview Define an operating system
Mobile Security 310KM Lab 4 Group Presentation NG KING TUNG MA HO YIN CHE CHUN KIT WOO SHUN CHAK.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
310KM Mobile Commerce Applications Lab/Tutorial 4 Part 3 Team members: Li Chun Yin Pun Hoi Lam Shek Hin Shing.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Jorge Marchan 10mo a What is an ipad. Is the first tablet computer from Apple. The iPad is a flat, rectangular computer with a large, 9.7-inch.
Phone Trivia McKay Fackrell PLAY. What is the current operating system for Apple? Question one iOS Apple 8 OS X Lion OS X Yosemite.
SMART PHONES A review based on Android from Samsung Apple IPhones will have very similar operational characteristics.
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
A+ Certification Guide Chapter 10 Mobile Devices.
Sophos Mobile Security
Smartphones Adrián Preciado. Smartphones Index 1.iPhone OS 1.1Pros 1.2Cons 1.3Different iPhones 1.4 App Store 2.Android 2.1Pros 2.2Cons 2.3 Some phones.
Introduction to Mobile Computing CSE 390 Fall 2010.
Explain the purpose of an operating system
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
© 2015 albert-learning.com Android Operating System ANDROID OPERATING SYSTEM.
MICHAEL J MONROE. What is ? Collection of online services and software offered by Apple. Compatible with Mac OSX, Windows, iPhone, and iPod Touch. Released:
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Introduction to Android
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Latest Technology News and Updates |Information Technology updates | Android Blog | SSO
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
 Computer News  Amazon MP3 Music Store & Cloud  Next month plan show Chromebook  Yahoo compromised - reset password  One meeting a month (2 nd Wednesday)
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
 Computer News  IPad2  I presented Ipad Feb 9 th last year  Your Computer Problems  No Meeting March 28th  Website & 
Patrol Live The #1 Guard Tour App is now available on Android. All-in-one real-time guard tour app combines GPS geotag scanning, voice notes, photos, live.
EMBEDDED OPERATING SYSTEMS. DEFINITION An embedded operating system is a system for embedded computer systems These operating systems are designed to.
 Computer News/Tip  IPAD  Disclaimer – Projector & Signal  Your Computer Problems.
WIDESCREEN PRESENTATION Tips and tools for creating and presenting wide format slides.
Computer Maintenance Chapter Ten Mobile Devices Dr. Mohammad AlAhmad.
Make Your iPad Work for You Session 2 Brian McCarty.
Agenda  Top 12 security recommendations  Google Android specific recommendations  Apple iOS (iPad and iPhone) specific recommendations  General Fermilab.
Tablet Introduction How can a tablet help me?. What are tablets used for ?  Information Consumption  Internet surfing   Chat  Watching Video.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Chapter 8 Mobile Devices Cisco Networking Academy program
Sync Music/Video/Picture/Contacts from iCloud to iPhone/iPad/iPod All rights reserved—
Allyson Coan Adult Services Librarian June 13, 2016 iPad Basics Part 1.
How to stay safe using the internet and app’s?
Mobile Operating Systems
File Management in the Cloud
Enrolling Two-Factor Authentication (2FA)
CompTIA IT Fundamentals Study Guide (FC0-U51)
MOBILE OPERATING SYSTEM
MOBILE OPERATING SYSTEM
Everything you wanted to know but were afraid to ask a 10-year-old.
IPad 101.
Tablet and eBook Orientation
Managing and Monitoring Screen Time
Current State of Security and Privacy
Presentation transcript:

Tips on Securing Mobile Devices October 5, 2012 Preston Wiley, Network Security Manager, CISSP Mike Hill, Project Manager / Systems Analyst, CISSP

W HAT IS A M OBILE D EVICE ? Highly Portable Constantly connected to the Internet Able to run a variety of applications Easily stolen or misplaced Smartphones, Tablets Personally managed

M OBILE D EVICE O PERATING S YSTEMS iOS iPad iPhone iPod Touch Android Nexus 7 Samsung Galaxy HTC One, Desire, Evo, etc. Motorola RAZR MANY MANY MANY Others Blackberry, Symbian, Windows

W HY DO WE HAVE M OBILE D EVICES ? Highly Portable Convenient Always Stay Connected Remain Productive Coolness Factor

W HY SHOULD WE SECURE THEM ? As mobile devices become ingrained into our life, we store more and more data in them, such as: o o Contacts o Photos and we use various apps to make our lives easier: o Social: Facebook, Twitter, LinkedIn o Financial: Paypal, eBay, Amazon o Cloud Storage: Dropbox, Google Drive o Maps: Mapquest, Google Maps o Games: Angry Birds, Bad Piggies

T IP #1: L OCK D EVICE Passcodes o Pins o Pattern (Android) o Facial Recognition (Android 4) o Passwords Auto-Lock (Screen Timeout) o 1 minute to 5 minutes o Shorter time is more secure o Be aware of apps that can be accessed when locked

T IP #2: U PDATE A PPS Keep apps up-to-date using official sites o Apple App Store (iOS) o Google Play (Android) Be wary of 3rd party apps from unofficial sites (Android) o When you allow unknown apps on Android, you allow them from ALL sources o Only turn this option on if you need it and turn it off when you don't need it. o There are legitimate stores other than Google Play that require this to be turned on: Amazon App Store

T IP #3: D ISABLE N ETWORK S ERVICES Benefits to disabling services o These services can pose security risks o Can also extend battery life WiFi o Constantly scans for WiFi networks o Beware of open networks (unencrypted) Bluetooth o Turn off or set to non-discoverable if not needed o Used for hands free devices and wireless keyboards o Can be used to view your contacts and make calls with your phone.

T IP #4: B EWARE OF QR CODES Which QR code is the malicious one?

Tips 5-10

T IP #5: U PDATE O PERATING S YSTEM Update OS to latest version available to you o iOS 6 o Android 4.1 (Jelly Bean) o BlackBerry 7.1 OS o Windows Phone 7.5 *Data as of October 1, 2012*Data as of September 30, 2012

T IP #6: C ONFIGURE L OCATION S ERVICES Popular features of location services o Photos - geotagging o Maps - turn by turn navigation Beware of disclosing location publicly o Please Rob Me (2010) o U.S. Army warns about geotagging (2007) Recommended Configuration o Disable if not needed o Only enable for specific apps when needed

T IP #7: B ACKUP D EVICE

Backup your device o Device should not be sole source of this data o Data can be encrypted during backup to iTunes (iOS) o Backups based on Google Account (Android) Be aware of any sensitive data on device o Financial documents o Tax records o Health records o Passwords

T IP #8: W IPE D EVICE Erase data on device before o Return o Repair o Resale Auto-Wipe o Erases data after 10 failed attempts (iOS) o Autowipe app (Android 2.2+) Remote Wipe o Gives you the ability to remotely wipe device

T IP #9: F IND D EVICE Find My iPhone (iOS) o Requires iOS 5+ o Locate your device on a map o Display custom message o Remotely lock or wipe device o Lost Mode (iOS 6) LocateMyDroid (Android) o Available on Android OS 2.2+ o Visually see your phone on a map o Remotely lock/wipe phone (admin) Create ICE for lock screen

T IP #10: S ECURE B ROWSER S ETTINGS Recommended Settings o Block Pop-ups o Enable Private Browsing o Enable Fraud Warning (iOS) o Disable AutoFill o Disable Location Services o Clear history and cookies

W RAP -U P 10 Tips for Increased Security 1. Lock Device 2. Update Apps 3. Disable Network Services 4. Beware of QR Codes 5. Update Operating System 6. Configure Location Services 7. Backup Device 8. Wipe Device 9. Find Device 10. Secure Browser Settings

S ERIOUS ABOUT S ECURITY P ODCAST New episodes recorded every two weeks

Q&A Preston Wiley Mike Hill

R EFERENCES Android Distribution Chart iOS Distribution Chart Permission to use Dilbert comics provided by Universal Uclick Please Rob Me U.S. Army warns about the risks of geotagging the-risks-of-geotagging/