Your SlideShare is downloading. ×
0
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Mobile Device Security in the Workplace: 6 Key Risks & Challenges
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Mobile Device Security in the Workplace: 6 Key Risks & Challenges

18,731

Published on

Employees aren't just bringing their mobile devices to the workplace—they're living on them. A recent study by Pew Research found that 44 percent of smartphone owners sleep with their devices next to …

Employees aren't just bringing their mobile devices to the workplace—they're living on them. A recent study by Pew Research found that 44 percent of smartphone owners sleep with their devices next to their beds to avoid missing a call, text message, or other update during the night. And IDC Research reports 62 percent of nearly 8,000 18-to-44-year old iPhone and Android users reach for them immediately after waking up.

As smartphones and tablets become constant companions, cyber attackers are using every avenue available to break into them. Many people expect that iPhone or Android devices are secure by default, when in reality it is up to the user to make security configuration changes. With the right (inexpensive) equipment, hackers can gain access to a nearby mobile device in less than 30 seconds and either mirror the device and see everything on it, or install malware that will enable them to siphon data from it at their leisure.

The nature and types of cyber attacks are evolving rapidly, and mobile devices have become a critical part of enterprise cyber-security efforts with good reason. Analysts predict that by 2018, 25 percent of corporate data will completely bypass perimeter security and flow directly from mobile devices to the cloud.

Chief information security officers (CISOs) and other security executives are finding that the proliferation of mobile devices and cloud services are their biggest barriers to effective breach response. In order to secure the corporate data passing through or residing on mobile devices, it is imperative to fully understand the issues they present.

Published in: Technology, Business
13 Comments
84 Likes
Statistics
Notes
No Downloads
Views
Total Views
18,731
On Slideshare
0
From Embeds
0
Number of Embeds
19
Actions
Shares
0
Downloads
0
Comments
13
Likes
84
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • In order to secure the corporate data passing through or residing on these devices, it is imperative to first understand the key security risks.
  • Transcript

    • 1. HENRY is a business man
    • 2. …and a trivia man
    • 3. * A DNAinfo New York Review
    • 4. That’s a lot of SENSITIVE INFO!
    • 5. Security Threat
    • 6. Wait… There are more?
    • 7. Sadly, yes.
    • 8. http://focus.forsythe.com/articles/55/Mobile- Device-Security-in-the-Workplace-6-Key-Risks- and-Challenges
    • 9. http://focus.forsythe.com/articles/56/Critical- Elements-of-a-Successful-Mobile-Security-Plan
    • 10. www.forsythe.com.

    ×