+ All Categories
Home > Technology > Avoiding a BYOD Blowup!

Avoiding a BYOD Blowup!

Date post: 18-Oct-2014
Category:
View: 479 times
Download: 2 times
Share this document with a friend
Description:
There sure are a lot of smartphones and tablets the workplace these days! With the recent BYOD explosion, more and more devices have access to your company’s critical data. What is an IT pro to do to mitigate the threat posed by these devices? Learn how to protect your workforce, secure your network, and educate your users about threats.
15
Avoid a BYOD Blowup! Securing mobile devices @ supertsai Peter Tsai, Spiceworks IT Content Guru
Transcript

Slide 1

Avoid a BYOD Blowup! Securing mobile devices

@supertsaiPeter Tsai, Spiceworks IT Content Guru

Presented by Spiceworks

http://spiceworks.com/webinars

BYOD = Bring Your Own Danger

What are BYOD & Mobile Security?

Why is mobile security Important?

What are BYOD risks / threats?

How the heck to guard against threats?

Security, an ongoing process

Device

With Special Guest

Joe ForanIT Director - Bridgeport, CT

20 years in IT

A+, CCA, CNE, MCITP, MCP (XP), MCSE, Network+, Security+, Server+

What are BYOD & Mobile Security?

Bring Your Own Device (BYOD)

Policy of letting employees to bring their

own mobile devices to work, and allowing

those devices to access the company

network.

Mobile Devices include:

laptops, tablets, and smart phones

BYOD

BYOB

How many Ds are there in BYOD?

More than 1 billion people have a

smartphone

1 in 3 American adults owns a tablet

500 million laptops are sold every year worldwide

All of these devices can connect to

networks through Wi-Fi (or a hard wire)

SO

MANY

DEVICES!

OMG!

Why is Mobile Security Important?A weak BYOD policy could result in

Exposed data

Theft of sensitive information

Devices infected with viruses

Websites or accounts hijacked

Data corruption

System downtime

Financial Loss / Damage to brand

Compliance penalties

Bandwidth constraints

BYOD DOG

HACKING

YOUR

INTERNETS

What are Examples of Security FAILs?Data Breaches / Data Thefto Target

o Neiman Marcus

o JC Penney

o 7-Eleven

o Dow Jones servers

o US Military

o Iran nuclear centrifuges

o Social Security numbers at data brokers

o My Facebook

What are Examples of Security FAILs?

NSFW

NSFW

NSFW

What are MDM and MAM?MDM (Mobile Device Management)

Software that IT can use to monitor, inventory,

manage, lock down, control, encrypt, track,

wipe, and enforce policies on mobile devices

MAM (Mobile Application Management)

Like MDM, but MAM can lock down specific

apps on a device instead of the entire

device. MAM also helps limit the sharing of

corporate data among apps.

What are BYOD security measures?

Layered Approach to Security

Authenticate

Protect

Educate

Secure

NETWORK

SECURED!

What are BYOD security measures?

Authenticate

Password protect devices

Restrict access to networks

Disallow anonymous access

Consider a separate guest network

Protect

Encrypt data

Limit external access

Antivirus / Antimalware

Patch management

Firewalls

Application control

Network monitoring

No jailbreaking

Desktop virtualization

What are BYOD security measures?

Educate

People can be your weakest link

Social engineering can target specific people

Some are unaware of threats and the need for

a BYOD policy

New threats are always emerging

Secure

Secure physical systems

Wipe devices if they go missing

Physical security policies to minimize risk

Perform regular security audits

Security is an ongoing process!

Where can I learn more about BYOD?

http://community.spiceworks.com/mobile/mdm_byod


Recommended