• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Mobile Devices in the Workplace: 5 Key Security Risks
 

Mobile Devices in the Workplace: 5 Key Security Risks

on

  • 14,072 views

Whether your company has formally adopted mobile devices or not, they are in your enterprise. In order to secure the corporate data passing through or residing on these devices, it is imperative to ...

Whether your company has formally adopted mobile devices or not, they are in your enterprise. In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the risks. These risks can be categorized into five areas.

With well-supported mobility and security awareness programs in place, your organization can strike the right balance between security and usability, and embrace the next generation of mobile devices.

Statistics

Views

Total Views
14,072
Views on SlideShare
9,641
Embed Views
4,431

Actions

Likes
80
Downloads
0
Comments
13

19 Embeds 4,431

http://focus.forsythe.com 2838
http://tweakyourslides.wordpress.com 1154
http://groupintranet.economist.com 203
http://10.1.1.110 121
http://www.windsorresources.com 33
https://csuglobal.blackboard.com 33
http://csuglobal.blackboard.com 13
http://www.weebly.com 9
http://pinterest.com 7
https://tweakyourslides.wordpress.com 5
https://translate.googleusercontent.com 3
http://accessplus.com.ph 3
http://www.linkedin.com 2
http://www.onlydoo.com 2
http://www.google.com 1
https://twitter.com 1
http://webcache.googleusercontent.com 1
http://localhost 1
http://translate.googleusercontent.com 1
More...

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

110 of 13 previous next Post a comment

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…

110 of 13 previous next

Post Comment
Edit your comment
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.

Mobile Devices in the Workplace: 5 Key Security Risks Mobile Devices in the Workplace: 5 Key Security Risks Presentation Transcript

  • Mobile Devices in theWorkplace: 5 KeySecurity RisksDEVICESIN THEWORKPLACE:MOBILE
  • Meet HenryHENRYmeet
  • HENRY is a business manHENRYis a business man
  • …and a trivia man…and a trivia man
  • HeyHenry, DIDYOUKNOW…
  • Personal Items Lost* A Credant Technologies survey
  • A set of …
  • Two…
  • One...CATone
  • A few…TOILET SEATSa few
  • 12…
  • Yikes…ASHESFUNERAL
  • And finally…
  • Oh! And I almost forgot..
  • 60,000 Mobile Phones!
  • And that is just in…And that’s just in NEW YORK CITY
  • 20K 500K200KPHOTOS WORD DOCS EMAILS CONTACTSMany of those lost devices can store:10K
  • That’s a lot ofSENSITIVE INFO!
  • Imagine if…
  • Think about the risk
  • Confidential Information
  • Security Threat
  • Wait… There are more?
  • Sadly, yes.
  • 5 Key Security Risks
  • COMMUNICATIONINTERCEPTION
  • Look FamiliarLOOKFAMILIAR?
  • WiFi Hot Spots
  • Hmmm….
  • A coffee shop?a COFFEE SHOP?
  • A terminal?a TERMINAL?
  • A Library?a LIBRARY?
  • WiFi Hot Spots…For companies withemployees who useWi-Fi hot spots…
  • Stakes are high!…the stakes are high!
  • Smartphones are…Also, Wi-Fi enabledsmartphones are…
  • Susceptible to……susceptible tothe same attacks...
  • Affecting other devices…that affect otherWi-Fi enabled devices.
  • Malicious Code
  • Malware attacks.
  • Malware threatsIn fact, mobilemalware threats…
  • On the rise
  • Operating Systems…and continueto affect the mostprevalent mobileoperating systems.
  • According to JuniperNetworks…According toJuniper Networks…
  • …between 2010 and2011……between 2010and 2011…
  • …malware for androidrose…
  • Before…before
  • After…after
  • That’s shocking!
  • Device Attacks
  • Designed to…
  • Gain Control
  • Denial of Service…or attempta denial ofservice (DoS).
  • Device attacksDEVICE ATTACKSare similar to...In addition,
  • PC attacks…PC ATTACKSof the past!
  • Such as…Such as…
  • Browser-based attacks
  • Buffer overflowexploitationsBuffer overflow exploitations
  • Application-basedattacksBuffer overflow exploitations
  • Physical Access
  • Perfect travel companion
  • They are…I mean, they are…
  • small1 2 3 4 5 6small
  • Portableportable
  • Lightweight0and lightweight.
  • Easy to stealBut, that alsomeans they areeasy to steal…
  • Leave behind…or leave behindin airports and taxis.
  • Remember this?
  • 60,000 Mobile Devices.
  • Clever dog.
  • Insider threats
  • From within
  • Malicious insidersMalicious insiders canuse mobile devices toleak important data.
  • For instanceFor instance
  • Sharing corporateinformationSharing corporateinformation from asmartphone will…
  • Circumvent…often circumventrobust monitoringsystems, like DataLoss Prevention.
  • Yikes.
  • Let’s review
  • 5 risks
  • Mobile device adoptionWhether or notyour company hasformally adoptedmobile devices…
  • In your enterprise…they are inyour enterprise.
  • You! So, what shouldYOU do?
  • 5 Key Security RisksTake the next step.Address the 5 KeySecurity Risks.
  • I know Henry willI knowHENRY will.
  • Read the entire article at FOCUS Online:http://focus.forsythe.com/articles/55/Mobile-Devices-in-the-Workplace-5-Key-Security-Risks
  • Or learn about the next steps in managingand securing devices in your workplace:http://focus.forsythe.com/articles/56/Critical-Elements-of-a-Successful-Mobile-Security-Plan
  • Mobile Devices in the Workplace: 5 Key Security RisksPresentation design and adaptation byJordan Voskuil, Senior CommunicationsSpecialist at Forsythe Technology, Inc.Technology consulting, IT infrastructuretechnology and integration, andleasing solutions for your business.Visit us at www.forsythe.com.Original article written by Jack Burback,Program Manager at Forsythe Technology, Inc.Published by Forsythe FOCUS OnlineBrought to you by: