SlideShare a Scribd company logo
1 of 8
JOSEPH G. SUKHBIR
Security Awareness in an
Unregulated Environment
or – how to engage with creative people on security

• We sometimes operate in our own bubbles and get invested in a
  technical language that only those in the know speak.
• When an average user hears this they ‘switch off’.
• We also rely on technical solutions to protect what we sometimes see
  as un-cooperative users who won’t understand the complex concepts of
  information security.
• In a creative company these end users are very technologically literate
  and are highly skilled using their particular suite of applications.
• But user awareness has always been one of the best security tools that
  has been available
TOPIC:
• Security Awareness in an Unregulated Environment – or – how to engage with creative people on security.

SYNOPSIS
• As security professionals we sometimes think that technical solutions will solve our problems, and we
   forget about the users.
• One of the most effective tools for information security has always been user awareness.
• Working in a creative environment, with technologically literate, creative users can be challenging. Always
   speak at their Level. Traditional user awareness will not work on these users as they will perceive it as if
   you are talking down to them.
• Overcoming technological challenges in securing artist content.
• Combining best practise into a positively worded message. I will talk about the user awareness that I
   conduct with these users.
• How do we market security to key stakeholders to empower them to protect the company and
   themselves. Both internal and external partners. Scenario based, rather than concrete instructions.
CREATIVE AWARENESS

• So how do you engage with people without them switching
  off.
• Make friends with you marketing/corporate comms
  department.
• Use lots of pictures
• Use real world examples.
• Refer to items that have been in the news recently.
• Stay on topic, but keep it topical.
SECURING ARTIST CONTENT

•   Obfuscate names of content. All files created or modified should be registered under a fake name. NO reference to the
    artists or project should be made at any point.
•   Keep new projects confidential
     –    MIXES, MASTERS, PARTS, STEMS, and WORK IN PROGRESS are all extremely valuable, and highly sought after in the piracy world.
     –    Access is limited to only those who need to work on the project. NO ONE else has access, there are no exceptions.
     –    Artists are advised not to send anything to anyone not involved in the project, at any stage.
     –    Session file access should be limited to you and those working directly on the project.
•   There will come a time when files need to be transferred:
     –    EMI Music provides secure methods to store, share and work on projects (such as a secure FTP server).
     –    Artists are advised to not use insecure (free) “Cloud” based services such as You Send It, Sound Cloud, Rapid Share, iCloud.
     –    In an emergency, some paid for secure storage services (such as box.com or huddle.com) can be used IF: (1) the service is password
          protected, (2) the password is not communicated via email under any circumstances, (3) the password is changed immediately before and
          after delivery and (4) the file is deleted from the service following delivery.
•   When using multiple working environments, i.e. a different studio to mix and track in, make sure all session files are
    deleted from any scratch discs at the end of the session and the computer's trash/recycling folder is emptied.
Message to artists

•     Positively worded
        –    Artists are high profile targets of hackers. Attacks range from black mail to false allegations based on skewed morality of hackers. Stalker and scammers also target artists.
•     There have been a large number of high profile early leaks of songs and unreleased music from big acts, which we believe have been the result of professional
      hackers and scammers who are targeting studios, artist, producers, managers and labels.
•     A number of the leaks have been hacked directly from an artist's or producer's own computer. We have confirmed that one of the hackers utilised an insecure
      Wi-Fi connection and gathered content as it was being transferred across the network.
•     3 things to do IMMEDIATELY if they have believe they have been compromised.
        –    Call management and EMI representative
        –    Call their bank
        –    Call law enforcement
•     Artists use their own computer hardware and software so we have no corporate control over these machines. The best we can do is provide a list of best
      practices such as:
        –    Device encryption.
        –    Anti-malware
        –    Passwords
        –    Beware of phishing email
        –    Check privacy settings
        –    Social networking (see below)
        –    Mobile devices (see below)
SOCIAL NETWORKING

• Social networks remain one of the best ways to engage with fans, but as
  in real life, internet based social networks pose certain risks. EMI
  encourages their safe use both by artists and artist management.
• Keep your public and private lives separate. Keep personal information
  like home addresses, phone numbers, club cards, credit card
  information, personal email addresses, off public sites.
• Switch off location information on social posts. Location information, on
  some services, is switched on by default. This can allow fans, press and
  stalkers to pinpoint your location.
Mobile devices

• Mobile devices include smart phones and tablets, such as the
  iPhone and iPad. As mobile devices become more powerful they
  can hold more original, personal and pre-release content. As
  personal computers and laptops have been, and continue to be
  targets, so mobile devices will become targets.
• Make sure that your mobile device has the option to remote
  wipe the device enabled.
• Encrypt data on the device.

More Related Content

Viewers also liked

Richard Corbridge, CIO at NIHR - Open data within clinical research environment
Richard Corbridge, CIO at NIHR - Open data within clinical research environmentRichard Corbridge, CIO at NIHR - Open data within clinical research environment
Richard Corbridge, CIO at NIHR - Open data within clinical research environmentGlobal Business Events
 
Richard Wallace - Building and leading a high performing global team
Richard Wallace - Building and leading a high performing global teamRichard Wallace - Building and leading a high performing global team
Richard Wallace - Building and leading a high performing global teamGlobal Business Events
 
Mandla Nkosi, CIO at South African Mint - Achieving greater synergy and colla...
Mandla Nkosi, CIO at South African Mint - Achieving greater synergy and colla...Mandla Nkosi, CIO at South African Mint - Achieving greater synergy and colla...
Mandla Nkosi, CIO at South African Mint - Achieving greater synergy and colla...Global Business Events
 
Mobile Engagement
Mobile EngagementMobile Engagement
Mobile EngagementPamela Day
 
Changes to improve your health
Changes to improve your health Changes to improve your health
Changes to improve your health Pamela Day
 
'How to' guide for better sleep
'How to' guide for better sleep'How to' guide for better sleep
'How to' guide for better sleepPamela Day
 
แสงและการหักเห2
แสงและการหักเห2แสงและการหักเห2
แสงและการหักเห2DAWKAJAY20
 

Viewers also liked (10)

Richard Corbridge, CIO at NIHR - Open data within clinical research environment
Richard Corbridge, CIO at NIHR - Open data within clinical research environmentRichard Corbridge, CIO at NIHR - Open data within clinical research environment
Richard Corbridge, CIO at NIHR - Open data within clinical research environment
 
Giaotrinh toe fl
Giaotrinh toe flGiaotrinh toe fl
Giaotrinh toe fl
 
Richard Wallace - Building and leading a high performing global team
Richard Wallace - Building and leading a high performing global teamRichard Wallace - Building and leading a high performing global team
Richard Wallace - Building and leading a high performing global team
 
Mandla Nkosi, CIO at South African Mint - Achieving greater synergy and colla...
Mandla Nkosi, CIO at South African Mint - Achieving greater synergy and colla...Mandla Nkosi, CIO at South African Mint - Achieving greater synergy and colla...
Mandla Nkosi, CIO at South African Mint - Achieving greater synergy and colla...
 
adverbs of frequency
adverbs of frequencyadverbs of frequency
adverbs of frequency
 
F2011 chinachapter
F2011 chinachapterF2011 chinachapter
F2011 chinachapter
 
Mobile Engagement
Mobile EngagementMobile Engagement
Mobile Engagement
 
Changes to improve your health
Changes to improve your health Changes to improve your health
Changes to improve your health
 
'How to' guide for better sleep
'How to' guide for better sleep'How to' guide for better sleep
'How to' guide for better sleep
 
แสงและการหักเห2
แสงและการหักเห2แสงและการหักเห2
แสงและการหักเห2
 

More from Global Business Events

Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...Global Business Events
 
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...Global Business Events
 
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...Global Business Events
 
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...Global Business Events
 
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...Global Business Events
 
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT ModernisationHakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT ModernisationGlobal Business Events
 
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Global Business Events
 
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Global Business Events
 
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Global Business Events
 
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...Global Business Events
 
John Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyJohn Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyGlobal Business Events
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Global Business Events
 
Keith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingKeith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingGlobal Business Events
 
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseDavid Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseGlobal Business Events
 
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Global Business Events
 
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Global Business Events
 
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Global Business Events
 
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Global Business Events
 
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Global Business Events
 

More from Global Business Events (20)

Cio Event
Cio EventCio Event
Cio Event
 
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
 
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
 
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
 
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
 
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
 
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT ModernisationHakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
 
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
 
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
 
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
 
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
 
John Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyJohn Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security Anxiety
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Keith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingKeith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined Everything
 
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseDavid Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
 
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
 
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
 
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
 
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
 
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
 

Joseph Sukhbir - Security Awareness in an Unregulated Environment – or – how to engage with creative people on security

  • 1. JOSEPH G. SUKHBIR Security Awareness in an Unregulated Environment
  • 2. or – how to engage with creative people on security • We sometimes operate in our own bubbles and get invested in a technical language that only those in the know speak. • When an average user hears this they ‘switch off’. • We also rely on technical solutions to protect what we sometimes see as un-cooperative users who won’t understand the complex concepts of information security. • In a creative company these end users are very technologically literate and are highly skilled using their particular suite of applications. • But user awareness has always been one of the best security tools that has been available
  • 3. TOPIC: • Security Awareness in an Unregulated Environment – or – how to engage with creative people on security. SYNOPSIS • As security professionals we sometimes think that technical solutions will solve our problems, and we forget about the users. • One of the most effective tools for information security has always been user awareness. • Working in a creative environment, with technologically literate, creative users can be challenging. Always speak at their Level. Traditional user awareness will not work on these users as they will perceive it as if you are talking down to them. • Overcoming technological challenges in securing artist content. • Combining best practise into a positively worded message. I will talk about the user awareness that I conduct with these users. • How do we market security to key stakeholders to empower them to protect the company and themselves. Both internal and external partners. Scenario based, rather than concrete instructions.
  • 4. CREATIVE AWARENESS • So how do you engage with people without them switching off. • Make friends with you marketing/corporate comms department. • Use lots of pictures • Use real world examples. • Refer to items that have been in the news recently. • Stay on topic, but keep it topical.
  • 5. SECURING ARTIST CONTENT • Obfuscate names of content. All files created or modified should be registered under a fake name. NO reference to the artists or project should be made at any point. • Keep new projects confidential – MIXES, MASTERS, PARTS, STEMS, and WORK IN PROGRESS are all extremely valuable, and highly sought after in the piracy world. – Access is limited to only those who need to work on the project. NO ONE else has access, there are no exceptions. – Artists are advised not to send anything to anyone not involved in the project, at any stage. – Session file access should be limited to you and those working directly on the project. • There will come a time when files need to be transferred: – EMI Music provides secure methods to store, share and work on projects (such as a secure FTP server). – Artists are advised to not use insecure (free) “Cloud” based services such as You Send It, Sound Cloud, Rapid Share, iCloud. – In an emergency, some paid for secure storage services (such as box.com or huddle.com) can be used IF: (1) the service is password protected, (2) the password is not communicated via email under any circumstances, (3) the password is changed immediately before and after delivery and (4) the file is deleted from the service following delivery. • When using multiple working environments, i.e. a different studio to mix and track in, make sure all session files are deleted from any scratch discs at the end of the session and the computer's trash/recycling folder is emptied.
  • 6. Message to artists • Positively worded – Artists are high profile targets of hackers. Attacks range from black mail to false allegations based on skewed morality of hackers. Stalker and scammers also target artists. • There have been a large number of high profile early leaks of songs and unreleased music from big acts, which we believe have been the result of professional hackers and scammers who are targeting studios, artist, producers, managers and labels. • A number of the leaks have been hacked directly from an artist's or producer's own computer. We have confirmed that one of the hackers utilised an insecure Wi-Fi connection and gathered content as it was being transferred across the network. • 3 things to do IMMEDIATELY if they have believe they have been compromised. – Call management and EMI representative – Call their bank – Call law enforcement • Artists use their own computer hardware and software so we have no corporate control over these machines. The best we can do is provide a list of best practices such as: – Device encryption. – Anti-malware – Passwords – Beware of phishing email – Check privacy settings – Social networking (see below) – Mobile devices (see below)
  • 7. SOCIAL NETWORKING • Social networks remain one of the best ways to engage with fans, but as in real life, internet based social networks pose certain risks. EMI encourages their safe use both by artists and artist management. • Keep your public and private lives separate. Keep personal information like home addresses, phone numbers, club cards, credit card information, personal email addresses, off public sites. • Switch off location information on social posts. Location information, on some services, is switched on by default. This can allow fans, press and stalkers to pinpoint your location.
  • 8. Mobile devices • Mobile devices include smart phones and tablets, such as the iPhone and iPad. As mobile devices become more powerful they can hold more original, personal and pre-release content. As personal computers and laptops have been, and continue to be targets, so mobile devices will become targets. • Make sure that your mobile device has the option to remote wipe the device enabled. • Encrypt data on the device.