SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Avoid a BYOD
Blowup!
Securing mobile devices
@supertsai
Peter Tsai, Spiceworks IT Content Guru
Presented by Spiceworks
http://spiceworks.com/webinars
BYOD = Bring Your Own Danger
• What are BYOD & Mobile Security?
• Why is mobile security Important?
• What are BYOD risks / threats?
• How the heck to guard against threats?
• Security, an ongoing process
Device
With Special Guest
Joe Foran
IT Director - Bridgeport, CT
20 years in IT
A+, CCA, CNE, MCITP, MCP (XP), MCSE, Network+, Security+, Server+
What are BYOD & Mobile Security?
Bring Your Own Device (BYOD)
Policy of letting employees to bring their
own mobile devices to work, and allowing
those devices to access the company
network.
Mobile Devices include:
laptops, tablets, and smart phones
BYOD
BYOB
How many Ds are there in BYOD?
More than 1 billion people have a
smartphone
1 in 3 American adults owns a tablet
500 million laptops are sold every year
worldwide
All of these devices can connect to
networks through Wi-Fi (or a hard wire)
SO
MANY
DEVICES!
OMG!
Why is Mobile Security Important?
A weak BYOD policy could result in
◦ Exposed data
◦ Theft of sensitive information
◦ Devices infected with viruses
◦ Websites or accounts hijacked
◦ Data corruption
◦ System downtime
◦ Financial Loss / Damage to brand
◦ Compliance penalties
◦ Bandwidth constraints
BYOD DOG
HACKING
YOUR
INTERNETS
What are Examples of Security FAILs?
Data Breaches / Data Theft
o Target
o Neiman Marcus
o JC Penney
o 7-Eleven
o Dow Jones servers
o US Military
o Iran nuclear centrifuges
o Social Security numbers at data brokers
o My Facebook
What are Examples of Security FAILs?
NSFW
NSFW
NSFW
What are MDM and MAM?
MDM (Mobile Device Management)
Software that IT can use to monitor, inventory,
manage, lock down, control, encrypt, track,
wipe, and enforce policies on mobile devices
MAM (Mobile Application Management)
Like MDM, but MAM can lock down specific
apps on a device instead of the entire
device. MAM also helps limit the sharing of
corporate data among apps.
What are BYOD security measures?
Layered Approach to Security
Authenticate
Protect
Educate
Secure
NETWORK
SECURED!
What are BYOD security measures?
Authenticate
◦ Password protect
devices
◦ Restrict access to
networks
◦ Disallow anonymous
access
◦ Consider a separate
guest network
Protect
◦ Encrypt data
◦ Limit external access
◦ Antivirus / Antimalware
◦ Patch management
◦ Firewalls
◦ Application control
◦ Network monitoring
◦ No “jailbreaking”
◦ Desktop virtualization
What are BYOD security measures?
Educate
◦ People can be your
weakest link
◦ Social engineering can
target specific people
◦ Some are unaware of
threats and the need for
a BYOD policy
◦ New threats are always
emerging
Secure
◦ Secure physical systems
◦ Wipe devices if they go
missing
◦ Physical security policies
to minimize risk
◦ Perform regular security
audits
Security is an ongoing process!
Where can I learn more about BYOD?
http://community.spiceworks.com/mobile/mdm_byod

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data ProtectionGeekTek IT Services
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key FindingsSymantec
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
Internet google
Internet googleInternet google
Internet googleCollinwood
 
The Danger of the Future of Technology
The Danger of the Future of TechnologyThe Danger of the Future of Technology
The Danger of the Future of TechnologyJacquireEllis
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol reviewFabio Pietrosanti
 
Implementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD EraImplementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD EraKappa Data
 
infosec_for_journalists_2016
infosec_for_journalists_2016infosec_for_journalists_2016
infosec_for_journalists_2016Justin Giles
 
Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentCybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentHamilton Turner
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Rui Miguel Feio
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khanTajwar khan
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software PiracyPallavi Agarwal
 

Was ist angesagt? (20)

Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Internet google
Internet googleInternet google
Internet google
 
The Danger of the Future of Technology
The Danger of the Future of TechnologyThe Danger of the Future of Technology
The Danger of the Future of Technology
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol review
 
Implementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD EraImplementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD Era
 
infosec_for_journalists_2016
infosec_for_journalists_2016infosec_for_journalists_2016
infosec_for_journalists_2016
 
Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentCybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile Environment
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 

Andere mochten auch

Уз малу помоћ мојих пријатеља
Уз малу помоћ мојих пријатељаУз малу помоћ мојих пријатеља
Уз малу помоћ мојих пријатељаСлавица Јурић
 
Ainhoa joel-còmic-fotos5
Ainhoa joel-còmic-fotos5Ainhoa joel-còmic-fotos5
Ainhoa joel-còmic-fotos5Saray128
 
Temario examen final etica profesional 2012
Temario   examen  final   etica  profesional   2012Temario   examen  final   etica  profesional   2012
Temario examen final etica profesional 2012sandraruthi
 
Come to Sevilla. vídeo avi
Come to Sevilla. vídeo aviCome to Sevilla. vídeo avi
Come to Sevilla. vídeo aviJ.P. L.G.
 
Descentralização, Desconcentração e Dimensão Territorial da Política de CT&I ...
Descentralização, Desconcentração e Dimensão Territorial da Política de CT&I ...Descentralização, Desconcentração e Dimensão Territorial da Política de CT&I ...
Descentralização, Desconcentração e Dimensão Territorial da Política de CT&I ...Confap
 
Codigo de etica_iii
Codigo de etica_iiiCodigo de etica_iii
Codigo de etica_iiimoniqueli
 
5 Keys to Connecting with IT Pros in Social Communities
5 Keys to Connecting with IT Pros in Social Communities5 Keys to Connecting with IT Pros in Social Communities
5 Keys to Connecting with IT Pros in Social CommunitiesSpiceworks Ziff Davis
 
Discussion worksheet
Discussion worksheetDiscussion worksheet
Discussion worksheetIlse Haesen
 
Final program 11 27-12
Final program 11 27-12Final program 11 27-12
Final program 11 27-12dwestenberger
 
Authentication & Authoritation
Authentication & AuthoritationAuthentication & Authoritation
Authentication & Authoritationmelidevelopers
 
Eduardo Fernández Luiña - Austrian public choice
Eduardo Fernández Luiña - Austrian public choiceEduardo Fernández Luiña - Austrian public choice
Eduardo Fernández Luiña - Austrian public choiceSpanishLibertarian
 
El continente asiatico
El continente asiaticoEl continente asiatico
El continente asiaticocoreadelsur
 
Recuperacion de proceso de ofimatica
Recuperacion de proceso de ofimaticaRecuperacion de proceso de ofimatica
Recuperacion de proceso de ofimaticamelizacolqui
 

Andere mochten auch (19)

Уз малу помоћ мојих пријатеља
Уз малу помоћ мојих пријатељаУз малу помоћ мојих пријатеља
Уз малу помоћ мојих пријатеља
 
Ainhoa joel-còmic-fotos5
Ainhoa joel-còmic-fotos5Ainhoa joel-còmic-fotos5
Ainhoa joel-còmic-fotos5
 
Temario examen final etica profesional 2012
Temario   examen  final   etica  profesional   2012Temario   examen  final   etica  profesional   2012
Temario examen final etica profesional 2012
 
Come to Sevilla. vídeo avi
Come to Sevilla. vídeo aviCome to Sevilla. vídeo avi
Come to Sevilla. vídeo avi
 
Hola
HolaHola
Hola
 
Descentralização, Desconcentração e Dimensão Territorial da Política de CT&I ...
Descentralização, Desconcentração e Dimensão Territorial da Política de CT&I ...Descentralização, Desconcentração e Dimensão Territorial da Política de CT&I ...
Descentralização, Desconcentração e Dimensão Territorial da Política de CT&I ...
 
08 Monteil:Rejuvenating Creme
08 Monteil:Rejuvenating Creme08 Monteil:Rejuvenating Creme
08 Monteil:Rejuvenating Creme
 
Projek 3
Projek 3Projek 3
Projek 3
 
Codigo de etica_iii
Codigo de etica_iiiCodigo de etica_iii
Codigo de etica_iii
 
5 Keys to Connecting with IT Pros in Social Communities
5 Keys to Connecting with IT Pros in Social Communities5 Keys to Connecting with IT Pros in Social Communities
5 Keys to Connecting with IT Pros in Social Communities
 
La Rotonda del Laurel
La Rotonda del LaurelLa Rotonda del Laurel
La Rotonda del Laurel
 
Оштро перо 2.круг
Оштро перо 2.кругОштро перо 2.круг
Оштро перо 2.круг
 
Discussion worksheet
Discussion worksheetDiscussion worksheet
Discussion worksheet
 
Final program 11 27-12
Final program 11 27-12Final program 11 27-12
Final program 11 27-12
 
Authentication & Authoritation
Authentication & AuthoritationAuthentication & Authoritation
Authentication & Authoritation
 
Eduardo Fernández Luiña - Austrian public choice
Eduardo Fernández Luiña - Austrian public choiceEduardo Fernández Luiña - Austrian public choice
Eduardo Fernández Luiña - Austrian public choice
 
El continente asiatico
El continente asiaticoEl continente asiatico
El continente asiatico
 
Recuperacion de proceso de ofimatica
Recuperacion de proceso de ofimaticaRecuperacion de proceso de ofimatica
Recuperacion de proceso de ofimatica
 
Presentation1
Presentation1Presentation1
Presentation1
 

Ähnlich wie Avoiding a BYOD Blowup!

Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Sophos
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
Biometric System Penetration in Resource Constrained Mobile Device
Biometric System Penetration in Resource Constrained Mobile DeviceBiometric System Penetration in Resource Constrained Mobile Device
Biometric System Penetration in Resource Constrained Mobile Deviceijbbjournal
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Spiceworks Ziff Davis
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceRihab Chebbah
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptxKakshaPatel3
 
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...Global Business Events
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory CR Group
 
Cyber security and mobile devices
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devicesUmer Saeed
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0Jon Collins
 

Ähnlich wie Avoiding a BYOD Blowup! (20)

Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
 
cyber security
cyber securitycyber security
cyber security
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Biometric System Penetration in Resource Constrained Mobile Device
Biometric System Penetration in Resource Constrained Mobile DeviceBiometric System Penetration in Resource Constrained Mobile Device
Biometric System Penetration in Resource Constrained Mobile Device
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptx
 
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory
 
Cyber security and mobile devices
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devices
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Mobile security management
Mobile security managementMobile security management
Mobile security management
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
 
880 st011
880 st011880 st011
880 st011
 

Mehr von Spiceworks Ziff Davis

The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.Spiceworks Ziff Davis
 
Milking Spiceworks for all IT's worth
Milking Spiceworks for all IT's worthMilking Spiceworks for all IT's worth
Milking Spiceworks for all IT's worthSpiceworks Ziff Davis
 
Bang on tips for running a successful IT service business
Bang on tips for running a successful IT service businessBang on tips for running a successful IT service business
Bang on tips for running a successful IT service businessSpiceworks Ziff Davis
 
Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Spiceworks Ziff Davis
 
Group Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life EasierGroup Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life EasierSpiceworks Ziff Davis
 
On Your Mark! Getting ready and set to spice IT up in Spiceworks.
On Your Mark! Getting ready and set to spice IT up in Spiceworks. On Your Mark! Getting ready and set to spice IT up in Spiceworks.
On Your Mark! Getting ready and set to spice IT up in Spiceworks. Spiceworks Ziff Davis
 
US Presidents and the Evolution of Technology
US Presidents and the Evolution of TechnologyUS Presidents and the Evolution of Technology
US Presidents and the Evolution of TechnologySpiceworks Ziff Davis
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshareSpiceworks Ziff Davis
 
The Balance of art & Science: Tech Marketing To-Dos in Spiceworks
The Balance of art & Science: Tech Marketing To-Dos in SpiceworksThe Balance of art & Science: Tech Marketing To-Dos in Spiceworks
The Balance of art & Science: Tech Marketing To-Dos in SpiceworksSpiceworks Ziff Davis
 

Mehr von Spiceworks Ziff Davis (20)

Are You an IT Geek?
Are You an IT Geek?Are You an IT Geek?
Are You an IT Geek?
 
Windows Server 2003 Lifecycle
Windows Server 2003 LifecycleWindows Server 2003 Lifecycle
Windows Server 2003 Lifecycle
 
5 Signs You're Up to Spice!
5 Signs You're Up to Spice!5 Signs You're Up to Spice!
5 Signs You're Up to Spice!
 
Hiring Managers Tell All
Hiring Managers Tell AllHiring Managers Tell All
Hiring Managers Tell All
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.
 
Milking Spiceworks for all IT's worth
Milking Spiceworks for all IT's worthMilking Spiceworks for all IT's worth
Milking Spiceworks for all IT's worth
 
Managing the mobile takeover
Managing the mobile takeoverManaging the mobile takeover
Managing the mobile takeover
 
Intro to the Spiceworks Help Desk
Intro to the Spiceworks Help Desk Intro to the Spiceworks Help Desk
Intro to the Spiceworks Help Desk
 
Beancounters: Friend or Foe?
Beancounters: Friend or Foe? Beancounters: Friend or Foe?
Beancounters: Friend or Foe?
 
Bang on tips for running a successful IT service business
Bang on tips for running a successful IT service businessBang on tips for running a successful IT service business
Bang on tips for running a successful IT service business
 
Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!
 
Group Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life EasierGroup Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life Easier
 
Spiceworks Unplugged - Seattle!
Spiceworks Unplugged - Seattle!Spiceworks Unplugged - Seattle!
Spiceworks Unplugged - Seattle!
 
Top 3 demand gen challenges
Top 3 demand gen challengesTop 3 demand gen challenges
Top 3 demand gen challenges
 
On Your Mark! Getting ready and set to spice IT up in Spiceworks.
On Your Mark! Getting ready and set to spice IT up in Spiceworks. On Your Mark! Getting ready and set to spice IT up in Spiceworks.
On Your Mark! Getting ready and set to spice IT up in Spiceworks.
 
The IT Buyer's Path to Purchase
The IT Buyer's Path to PurchaseThe IT Buyer's Path to Purchase
The IT Buyer's Path to Purchase
 
You've got email!
You've got email!You've got email!
You've got email!
 
US Presidents and the Evolution of Technology
US Presidents and the Evolution of TechnologyUS Presidents and the Evolution of Technology
US Presidents and the Evolution of Technology
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshare
 
The Balance of art & Science: Tech Marketing To-Dos in Spiceworks
The Balance of art & Science: Tech Marketing To-Dos in SpiceworksThe Balance of art & Science: Tech Marketing To-Dos in Spiceworks
The Balance of art & Science: Tech Marketing To-Dos in Spiceworks
 

Kürzlich hochgeladen

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Avoiding a BYOD Blowup!

  • 1. Avoid a BYOD Blowup! Securing mobile devices @supertsai Peter Tsai, Spiceworks IT Content Guru
  • 3. BYOD = Bring Your Own Danger • What are BYOD & Mobile Security? • Why is mobile security Important? • What are BYOD risks / threats? • How the heck to guard against threats? • Security, an ongoing process Device
  • 4. With Special Guest Joe Foran IT Director - Bridgeport, CT 20 years in IT A+, CCA, CNE, MCITP, MCP (XP), MCSE, Network+, Security+, Server+
  • 5. What are BYOD & Mobile Security? Bring Your Own Device (BYOD) Policy of letting employees to bring their own mobile devices to work, and allowing those devices to access the company network. Mobile Devices include: laptops, tablets, and smart phones BYOD BYOB
  • 6. How many Ds are there in BYOD? More than 1 billion people have a smartphone 1 in 3 American adults owns a tablet 500 million laptops are sold every year worldwide All of these devices can connect to networks through Wi-Fi (or a hard wire) SO MANY DEVICES! OMG!
  • 7. Why is Mobile Security Important? A weak BYOD policy could result in ◦ Exposed data ◦ Theft of sensitive information ◦ Devices infected with viruses ◦ Websites or accounts hijacked ◦ Data corruption ◦ System downtime ◦ Financial Loss / Damage to brand ◦ Compliance penalties ◦ Bandwidth constraints BYOD DOG HACKING YOUR INTERNETS
  • 8. What are Examples of Security FAILs? Data Breaches / Data Theft o Target o Neiman Marcus o JC Penney o 7-Eleven o Dow Jones servers o US Military o Iran nuclear centrifuges o Social Security numbers at data brokers o My Facebook
  • 9. What are Examples of Security FAILs? NSFW NSFW NSFW
  • 10. What are MDM and MAM? MDM (Mobile Device Management) Software that IT can use to monitor, inventory, manage, lock down, control, encrypt, track, wipe, and enforce policies on mobile devices MAM (Mobile Application Management) Like MDM, but MAM can lock down specific apps on a device instead of the entire device. MAM also helps limit the sharing of corporate data among apps.
  • 11. What are BYOD security measures? Layered Approach to Security Authenticate Protect Educate Secure NETWORK SECURED!
  • 12. What are BYOD security measures? Authenticate ◦ Password protect devices ◦ Restrict access to networks ◦ Disallow anonymous access ◦ Consider a separate guest network Protect ◦ Encrypt data ◦ Limit external access ◦ Antivirus / Antimalware ◦ Patch management ◦ Firewalls ◦ Application control ◦ Network monitoring ◦ No “jailbreaking” ◦ Desktop virtualization
  • 13. What are BYOD security measures? Educate ◦ People can be your weakest link ◦ Social engineering can target specific people ◦ Some are unaware of threats and the need for a BYOD policy ◦ New threats are always emerging Secure ◦ Secure physical systems ◦ Wipe devices if they go missing ◦ Physical security policies to minimize risk ◦ Perform regular security audits
  • 14. Security is an ongoing process!
  • 15. Where can I learn more about BYOD? http://community.spiceworks.com/mobile/mdm_byod