SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Mobile Device Security
Crafting a mobile device strategy that fits your organization’s
                   needs while protecting information assets
Mobile Device Trends
ď‚— Smartphone shipments in 2012 are projected to be at
  around 631 million units, up from 468 million in 2011

ď‚— Tablet sales in 2012 are expected to nearly double last
  year’s tally of 60 million, at 119 million units

 Apple’s iPad platform is expected to account for 60% of
  those tablet sales

ď‚— PC hegemony over the market as the primary computing
  device in business is being challenged
Frequently forgotten factoids
about mobile devices
 They’re little computers; processor, memory and
  storage, just like the desktop or laptop PC in your office

ď‚— A would-be thief is more likely to steal a smartphone or
  tablet than a laptop

ď‚— If your device is stolen, and lacks both a passcode/PIN
  and data encryption, whatever’s on the device might as
  well be posted on Facebook

ď‚— Without a means to remotely manage a device, you
  have NO recourse in protecting/erasing sensitive data,
  should the device be lost or stolen
Mobile Device Security:
Key Considerations
ď‚— Will my company furnish the devices, or will we allow
  BYOD (Bring Your Own Device)? What about both?

ď‚— Where will sensitive data reside? On the server(s) or on
  the device itself?

ď‚— How is the information accessed?
Company-furnished devices
ď‚— Cost for cellular service and repair/replacement of
  lost/damaged phones is generally borne by the company

ď‚— Makes sense for organizations that publish the mobile
  phone number of these devices in the phonebook, on
  websites or in marketing materials

 Be as draconian as you’d like in managing these devices
  (they’re property of the company). No Facebook,
  Twitter, YouTube, etc.; just business. Erase at will if
  necessary.
BYOD (Bring Your Own Device)
ď‚— employees use their personal smartphones/tablets to
  access email and applications, which they're already
  familiar with (little to no training)

ď‚— employees bear the cost of service and
  repair/replacement when necessary

ď‚— a more measured approach to governing the encryption
  of information stored on the device, and the recourse
  with which to protect the data should the device
  become lost or stolen
BYOD cont’d
Example: An employee uses his/her personal device to
access company email, where sensitive information
sometimes crosses. Whereas a company-provided device
could be erased without question, an employee's BYOD
likely has personal contacts, personal email, music, etc. A
mobile device strategy should outline clear boundaries as
to how far a company can go to protect its data. In this
case, a mobile device policy could be designed in such a
way, that only the company email access for that device is
revoked, and the data removed, with no impact to other
apps/services on the device.
Company-furnished device versus
BYOD conclusion
ď‚— Different levels of device management can be applied
  to both classifications of device, whether you want to
  completely lock the device down, or you want the user
  to freely use the device as he/she wishes, as long as the
  device meets security requirements
Where the data resides
ď‚— Server: This is always preferable to any sensitive
  information residing on the device. Risks of data
  compromise are mitigated through PIN/password
  enforcement, and revocation of access to applications,
  services and data can be easily revoked on the server.
  More on this later.
ď‚— Device: We strongly discourage saving sensitive
  information on mobile devices, but if it can't be
  avoided, more stringent password/PIN requirements and
  encryption, coupled with the ability to erase the device
  in the event it's lost or stolen, protects against losses on
  this front.
How the information is accessed
ď‚— Email: Through mobile device management, we can encrypt
  data as it's stored on the device, revoke email access when
  warranted, and protect access to the device with passcodes
  or PINs.

ď‚— Desktop applications: Using technologies such as Citrix
  XenApp or Microsoft RemoteApp/Remote Desktop, we can
  provide secure access to programs and data residing on the
  server, without any of that information actually being stored
  on the mobile device. This is the preferred method for
  accessing your line-of-business apps. The actual processing of
  data resides on the server at all times, and you're simply
  viewing/interacting with it on your tablet or smartphone.
How the information is accessed
cont’d
ď‚— Web applications/webclips look and act like apps, but
  are really websites that are optimized for viewing on
  your mobile device. Similar to the Citrix/Terminal
  Services method for accessing apps and data, the data
  does not get stored on the mobile device, but instead
  just viewed. Transactions still take place on the server.
Wrap-up
Though the rapid adoption of mobile devices had initially
provided flexibility and opportunities for businesses, it's
also opened up businesses to old fashioned computer
security risks, just on a newer class of devices. The
methodology for securely incorporating these devices,
whether company-owned or personally owned, is taking
shape and should become a part of your overall IT
strategy, in the same way you'd secure a desktop or laptop
computer.

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacySolix Technologies, Inc
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce SecurityRebecca Jones
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur guptaAankur Gupta
 
Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!Mike Brannon
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudcloudresearcher
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepapergenasun
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityBharath Rao
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...Editor IJMTER
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksHyker Security
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Dr. Michael Agbaje
 

Was ist angesagt? (19)

Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur gupta
 
Intranets and Extranets
Intranets and ExtranetsIntranets and Extranets
Intranets and Extranets
 
Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
Byod
ByodByod
Byod
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networks
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 

Ă„hnlich wie Mobile Device Security

Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceRihab Chebbah
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Backstopp Mobile Slides
Backstopp Mobile SlidesBackstopp Mobile Slides
Backstopp Mobile SlidesRegan McCarthy
 
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...Kyron Baxter
 
Mobile Phone & Tablet Support
Mobile Phone & Tablet SupportMobile Phone & Tablet Support
Mobile Phone & Tablet SupportFelix Yanko
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 

Ă„hnlich wie Mobile Device Security (20)

Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
Backstopp Mobile Slides
Backstopp Mobile SlidesBackstopp Mobile Slides
Backstopp Mobile Slides
 
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
 
Mobile Phone & Tablet Support
Mobile Phone & Tablet SupportMobile Phone & Tablet Support
Mobile Phone & Tablet Support
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
880 st011
880 st011880 st011
880 st011
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 

Mehr von nexxtep

Password Management Tips
Password Management TipsPassword Management Tips
Password Management Tipsnexxtep
 
5-Step Email Marketing Plan
5-Step Email Marketing Plan5-Step Email Marketing Plan
5-Step Email Marketing Plannexxtep
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...nexxtep
 
10 Tips and Tricks Every iPhone and iPad User Should Know
10 Tips and Tricks Every iPhone and iPad User Should Know10 Tips and Tricks Every iPhone and iPad User Should Know
10 Tips and Tricks Every iPhone and iPad User Should Knownexxtep
 
The Modern Office
The Modern OfficeThe Modern Office
The Modern Officenexxtep
 
iPhone and iPad Tips and Tricks
iPhone and iPad Tips and TricksiPhone and iPad Tips and Tricks
iPhone and iPad Tips and Tricksnexxtep
 

Mehr von nexxtep (6)

Password Management Tips
Password Management TipsPassword Management Tips
Password Management Tips
 
5-Step Email Marketing Plan
5-Step Email Marketing Plan5-Step Email Marketing Plan
5-Step Email Marketing Plan
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
 
10 Tips and Tricks Every iPhone and iPad User Should Know
10 Tips and Tricks Every iPhone and iPad User Should Know10 Tips and Tricks Every iPhone and iPad User Should Know
10 Tips and Tricks Every iPhone and iPad User Should Know
 
The Modern Office
The Modern OfficeThe Modern Office
The Modern Office
 
iPhone and iPad Tips and Tricks
iPhone and iPad Tips and TricksiPhone and iPad Tips and Tricks
iPhone and iPad Tips and Tricks
 

KĂĽrzlich hochgeladen

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

KĂĽrzlich hochgeladen (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Mobile Device Security

  • 1. Mobile Device Security Crafting a mobile device strategy that fits your organization’s needs while protecting information assets
  • 2. Mobile Device Trends ď‚— Smartphone shipments in 2012 are projected to be at around 631 million units, up from 468 million in 2011 ď‚— Tablet sales in 2012 are expected to nearly double last year’s tally of 60 million, at 119 million units ď‚— Apple’s iPad platform is expected to account for 60% of those tablet sales ď‚— PC hegemony over the market as the primary computing device in business is being challenged
  • 3. Frequently forgotten factoids about mobile devices ď‚— They’re little computers; processor, memory and storage, just like the desktop or laptop PC in your office ď‚— A would-be thief is more likely to steal a smartphone or tablet than a laptop ď‚— If your device is stolen, and lacks both a passcode/PIN and data encryption, whatever’s on the device might as well be posted on Facebook ď‚— Without a means to remotely manage a device, you have NO recourse in protecting/erasing sensitive data, should the device be lost or stolen
  • 4. Mobile Device Security: Key Considerations ď‚— Will my company furnish the devices, or will we allow BYOD (Bring Your Own Device)? What about both? ď‚— Where will sensitive data reside? On the server(s) or on the device itself? ď‚— How is the information accessed?
  • 5. Company-furnished devices ď‚— Cost for cellular service and repair/replacement of lost/damaged phones is generally borne by the company ď‚— Makes sense for organizations that publish the mobile phone number of these devices in the phonebook, on websites or in marketing materials ď‚— Be as draconian as you’d like in managing these devices (they’re property of the company). No Facebook, Twitter, YouTube, etc.; just business. Erase at will if necessary.
  • 6. BYOD (Bring Your Own Device) ď‚— employees use their personal smartphones/tablets to access email and applications, which they're already familiar with (little to no training) ď‚— employees bear the cost of service and repair/replacement when necessary ď‚— a more measured approach to governing the encryption of information stored on the device, and the recourse with which to protect the data should the device become lost or stolen
  • 7. BYOD cont’d Example: An employee uses his/her personal device to access company email, where sensitive information sometimes crosses. Whereas a company-provided device could be erased without question, an employee's BYOD likely has personal contacts, personal email, music, etc. A mobile device strategy should outline clear boundaries as to how far a company can go to protect its data. In this case, a mobile device policy could be designed in such a way, that only the company email access for that device is revoked, and the data removed, with no impact to other apps/services on the device.
  • 8. Company-furnished device versus BYOD conclusion ď‚— Different levels of device management can be applied to both classifications of device, whether you want to completely lock the device down, or you want the user to freely use the device as he/she wishes, as long as the device meets security requirements
  • 9. Where the data resides ď‚— Server: This is always preferable to any sensitive information residing on the device. Risks of data compromise are mitigated through PIN/password enforcement, and revocation of access to applications, services and data can be easily revoked on the server. More on this later. ď‚— Device: We strongly discourage saving sensitive information on mobile devices, but if it can't be avoided, more stringent password/PIN requirements and encryption, coupled with the ability to erase the device in the event it's lost or stolen, protects against losses on this front.
  • 10. How the information is accessed ď‚— Email: Through mobile device management, we can encrypt data as it's stored on the device, revoke email access when warranted, and protect access to the device with passcodes or PINs. ď‚— Desktop applications: Using technologies such as Citrix XenApp or Microsoft RemoteApp/Remote Desktop, we can provide secure access to programs and data residing on the server, without any of that information actually being stored on the mobile device. This is the preferred method for accessing your line-of-business apps. The actual processing of data resides on the server at all times, and you're simply viewing/interacting with it on your tablet or smartphone.
  • 11. How the information is accessed cont’d ď‚— Web applications/webclips look and act like apps, but are really websites that are optimized for viewing on your mobile device. Similar to the Citrix/Terminal Services method for accessing apps and data, the data does not get stored on the mobile device, but instead just viewed. Transactions still take place on the server.
  • 12. Wrap-up Though the rapid adoption of mobile devices had initially provided flexibility and opportunities for businesses, it's also opened up businesses to old fashioned computer security risks, just on a newer class of devices. The methodology for securely incorporating these devices, whether company-owned or personally owned, is taking shape and should become a part of your overall IT strategy, in the same way you'd secure a desktop or laptop computer.