INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

Mobile Protection Overview
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
Thoughts on Technology Issues for Small Business Data Security for Mobile Access Devices.
7 Effective Habits when using the Internet Philip O’Kane 1.
Meraki Mobile Device Management
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
24/7/365 Remote Computer Support. Program Overview.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Internet Security In the 21st Century Presented by Daniel Mills.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Presentation By Deepak Katta
Your storage on the ground; Your files in the cloud.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Introduction to Computing Chapter 2 – Part 2 Industry of Computing William Johnson Julia Benson-Slaughter
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Android Mobile Security Krystal Salerno. Introductions.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
INTERNET SAFETY FOR KIDS
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Wireless and Mobile Security
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Get2Modern A plan for Windows XP & Office 2003 EOS migration in SMB Microsoft Confidential. NDA required.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Easy3s Smart Cop antivirus Total Security for Internet ERA.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
Cloud Storage Service with Proven Military Grade Security
Mobile Operating Systems
Hotspot Shield Protect Your Online Identity
Jenny Pange University of Ioannina
Customized Solutions to your needs
Your Computer Wants To Ruin Your Life
McAfee Activate  McAfee offers advanced security solutions to the computer users across the globe.  It offers a wide selection of antivirus and internet.
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
The Internet of Unsecure Things
Prepared By : Binay Tiwari
How to keep the bad guys out and your data safe
Security in mobile technologies
IT Office hours – 1 Data Sharing 101
IT Management, Simplified
Presentation transcript:

INTEROP 2014 Mobile Issues in the Network

Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware, etc. – Insecure computing practices Collaboration – Not physically connected to secure network – Consumer collaboration networks insecure

Data Loss Hardware failure – Protect via backups, cloud-based storage Malware – Protect via software, safe computing practices Data corruption – Protect as above

Data Theft and Leakage Hardware loss – Encrypt hard drives – Don’t store sensitive data on mobile devices – Remote wipe software and settings Data Espionage – Encrypt data on device and in transmission – Use privacy shields where possible – Protect against malware – Use safe computing practices Data Leakage – Separate secure from nonsecure IDs on shared devices – Use safe computing practices

Collaboration Sharepoint and other corporate solutions – Based on secure servers, sessions, and services – Data lie on secure servers Blacklist or wall off insecure cloud providers Protect sensitive data from being copied and/or transmitted elsewhere Encrypt sensitive data

Threat Vectors How do no-goodniks get into the network (or get the data)? – Malware – viruses, worms, spyware – Software exploits – back doors, bugs, vulnerabilities – Cyber eavesdropping and espionage – Social Engineering – phishing, pharming, etc. – Ads and unremovable pop-ups – Passwords and tokens stored on device Mobile Devices are just as vulnerable as computers are

Application Security Issues In-App Ads In-App Purchases Sideloaded Apps Bogus Apps Excessive Permissions

User Security Issues Shared devices with single ID/password Devices with no sign-on/password Using business devices over free Wi-Fi

Mobile Security Solutions – No longer limited to anti-malware – “Mobile” = Intended for Android, iOS, and other mobile devices – SoHo computer solutions still available from many vendors – Personal solutions may include App scanning Device security (device location, remote wipe, etc.) Backup/recovery

Enterprise Features App management – Push upgrades, remote wipe, whitelisting Authentication solutions – SecureID-like token-generating apps – Credentials management Device management – Location tracking, remote scanning, etc. All features of single-user editions

Security Software Providers Include Lookout (Android, iOS, Enterprise Mobile) Lookout Symantec (Android, iOS, Windows Phone, PC, Mac, Enterprise, Enterprise Mobile) Symantec Enterprise Mobile ESET (Android, PC, Mac, Linux*, SoHo, Business) ESET Vipre (Android, PC, iOS*, Mac*, Business) VipreBusiness Comodo (Android, PC, Mac, Linux, Business) Comodo *Business package only

Corporate Classified Information Android for Business Remote Wipe (most antimalware) Multiple Identities Cellrox

Whitepapers Don’t Lose the Data: Six Ways You May Be Losing Mobile Data and Don’t Even Know It – Symantec Don’t Lose the Data: Six Ways You May Be Losing Mobile Data and Don’t Even Know It Mobility Insight: 6 myths you can’t afford to ignore – HP Mobility Insight: 6 myths you can’t afford to ignore