Download presentation
Presentation is loading. Please wait.
Published byAustin Hector Wheeler Modified over 9 years ago
1
INTEROP 2014 Mobile Issues in the Network
2
Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware, etc. – Insecure computing practices Collaboration – Not physically connected to secure network – Consumer collaboration networks insecure
3
Data Loss Hardware failure – Protect via backups, cloud-based storage Malware – Protect via software, safe computing practices Data corruption – Protect as above
4
Data Theft and Leakage Hardware loss – Encrypt hard drives – Don’t store sensitive data on mobile devices – Remote wipe software and settings Data Espionage – Encrypt data on device and in transmission – Use privacy shields where possible – Protect against malware – Use safe computing practices Data Leakage – Separate secure from nonsecure IDs on shared devices – Use safe computing practices
5
Collaboration Sharepoint and other corporate solutions – Based on secure servers, sessions, and services – Data lie on secure servers Blacklist or wall off insecure cloud providers Protect sensitive data from being copied and/or transmitted elsewhere Encrypt sensitive data
6
Threat Vectors How do no-goodniks get into the network (or get the data)? – Malware – viruses, worms, spyware – Software exploits – back doors, bugs, vulnerabilities – Cyber eavesdropping and espionage – Social Engineering – phishing, pharming, etc. – Ads and unremovable pop-ups – Passwords and tokens stored on device Mobile Devices are just as vulnerable as computers are
7
Application Security Issues In-App Ads In-App Purchases Sideloaded Apps Bogus Apps Excessive Permissions
8
User Security Issues Shared devices with single ID/password Devices with no sign-on/password Using business devices over free Wi-Fi
9
Mobile Security Solutions – No longer limited to anti-malware – “Mobile” = Intended for Android, iOS, and other mobile devices – SoHo computer solutions still available from many vendors – Personal solutions may include App scanning Device security (device location, remote wipe, etc.) Backup/recovery
10
Enterprise Features App management – Push upgrades, remote wipe, whitelisting Authentication solutions – SecureID-like token-generating apps – Credentials management Device management – Location tracking, remote scanning, etc. All features of single-user editions
11
Security Software Providers Include Lookout (Android, iOS, Enterprise Mobile) Lookout Symantec (Android, iOS, Windows Phone, PC, Mac, Enterprise, Enterprise Mobile) Symantec Enterprise Mobile ESET (Android, PC, Mac, Linux*, SoHo, Business) ESET Vipre (Android, PC, iOS*, Mac*, Business) VipreBusiness Comodo (Android, PC, Mac, Linux, Business) Comodo *Business package only
12
Corporate Classified Information Android for Business Remote Wipe (most antimalware) Multiple Identities Cellrox
13
Whitepapers Don’t Lose the Data: Six Ways You May Be Losing Mobile Data and Don’t Even Know It – Symantec Don’t Lose the Data: Six Ways You May Be Losing Mobile Data and Don’t Even Know It Mobility Insight: 6 myths you can’t afford to ignore – HP Mobility Insight: 6 myths you can’t afford to ignore
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.