Date post: | 18-Oct-2014 |
Category: |
Technology |
View: | 479 times |
Download: | 2 times |
Slide 1
Avoid a BYOD Blowup! Securing mobile devices
@supertsaiPeter Tsai, Spiceworks IT Content Guru
Presented by Spiceworks
http://spiceworks.com/webinars
BYOD = Bring Your Own Danger
What are BYOD & Mobile Security?
Why is mobile security Important?
What are BYOD risks / threats?
How the heck to guard against threats?
Security, an ongoing process
Device
With Special Guest
Joe ForanIT Director - Bridgeport, CT
20 years in IT
A+, CCA, CNE, MCITP, MCP (XP), MCSE, Network+, Security+, Server+
What are BYOD & Mobile Security?
Bring Your Own Device (BYOD)
Policy of letting employees to bring their
own mobile devices to work, and allowing
those devices to access the company
network.
Mobile Devices include:
laptops, tablets, and smart phones
BYOD
BYOB
How many Ds are there in BYOD?
More than 1 billion people have a
smartphone
1 in 3 American adults owns a tablet
500 million laptops are sold every year worldwide
All of these devices can connect to
networks through Wi-Fi (or a hard wire)
SO
MANY
DEVICES!
OMG!
Why is Mobile Security Important?A weak BYOD policy could result in
Exposed data
Theft of sensitive information
Devices infected with viruses
Websites or accounts hijacked
Data corruption
System downtime
Financial Loss / Damage to brand
Compliance penalties
Bandwidth constraints
BYOD DOG
HACKING
YOUR
INTERNETS
What are Examples of Security FAILs?Data Breaches / Data Thefto Target
o Neiman Marcus
o JC Penney
o 7-Eleven
o Dow Jones servers
o US Military
o Iran nuclear centrifuges
o Social Security numbers at data brokers
o My Facebook
What are Examples of Security FAILs?
NSFW
NSFW
NSFW
What are MDM and MAM?MDM (Mobile Device Management)
Software that IT can use to monitor, inventory,
manage, lock down, control, encrypt, track,
wipe, and enforce policies on mobile devices
MAM (Mobile Application Management)
Like MDM, but MAM can lock down specific
apps on a device instead of the entire
device. MAM also helps limit the sharing of
corporate data among apps.
What are BYOD security measures?
Layered Approach to Security
Authenticate
Protect
Educate
Secure
NETWORK
SECURED!
What are BYOD security measures?
Authenticate
Password protect devices
Restrict access to networks
Disallow anonymous access
Consider a separate guest network
Protect
Encrypt data
Limit external access
Antivirus / Antimalware
Patch management
Firewalls
Application control
Network monitoring
No jailbreaking
Desktop virtualization
What are BYOD security measures?
Educate
People can be your weakest link
Social engineering can target specific people
Some are unaware of threats and the need for
a BYOD policy
New threats are always emerging
Secure
Secure physical systems
Wipe devices if they go missing
Physical security policies to minimize risk
Perform regular security audits
Security is an ongoing process!
Where can I learn more about BYOD?
http://community.spiceworks.com/mobile/mdm_byod