SlideShare a Scribd company logo
1 of 15
Download to read offline
Avoid a BYOD
Blowup!
Securing mobile devices
@supertsai
Peter Tsai, Spiceworks IT Content Guru
Presented by Spiceworks
http://spiceworks.com/webinars
BYOD = Bring Your Own Danger
• What are BYOD & Mobile Security?
• Why is mobile security Important?
• What are BYOD risks / threats?
• How the heck to guard against threats?
• Security, an ongoing process
Device
With Special Guest
Joe Foran
IT Director - Bridgeport, CT
20 years in IT
A+, CCA, CNE, MCITP, MCP (XP), MCSE, Network+, Security+, Server+
What are BYOD & Mobile Security?
Bring Your Own Device (BYOD)
Policy of letting employees to bring their
own mobile devices to work, and allowing
those devices to access the company
network.
Mobile Devices include:
laptops, tablets, and smart phones
BYOD
BYOB
How many Ds are there in BYOD?
More than 1 billion people have a
smartphone
1 in 3 American adults owns a tablet
500 million laptops are sold every year
worldwide
All of these devices can connect to
networks through Wi-Fi (or a hard wire)
SO
MANY
DEVICES!
OMG!
Why is Mobile Security Important?
A weak BYOD policy could result in
◦ Exposed data
◦ Theft of sensitive information
◦ Devices infected with viruses
◦ Websites or accounts hijacked
◦ Data corruption
◦ System downtime
◦ Financial Loss / Damage to brand
◦ Compliance penalties
◦ Bandwidth constraints
BYOD DOG
HACKING
YOUR
INTERNETS
What are Examples of Security FAILs?
Data Breaches / Data Theft
o Target
o Neiman Marcus
o JC Penney
o 7-Eleven
o Dow Jones servers
o US Military
o Iran nuclear centrifuges
o Social Security numbers at data brokers
o My Facebook
What are Examples of Security FAILs?
NSFW
NSFW
NSFW
What are MDM and MAM?
MDM (Mobile Device Management)
Software that IT can use to monitor, inventory,
manage, lock down, control, encrypt, track,
wipe, and enforce policies on mobile devices
MAM (Mobile Application Management)
Like MDM, but MAM can lock down specific
apps on a device instead of the entire
device. MAM also helps limit the sharing of
corporate data among apps.
What are BYOD security measures?
Layered Approach to Security
Authenticate
Protect
Educate
Secure
NETWORK
SECURED!
What are BYOD security measures?
Authenticate
◦ Password protect
devices
◦ Restrict access to
networks
◦ Disallow anonymous
access
◦ Consider a separate
guest network
Protect
◦ Encrypt data
◦ Limit external access
◦ Antivirus / Antimalware
◦ Patch management
◦ Firewalls
◦ Application control
◦ Network monitoring
◦ No “jailbreaking”
◦ Desktop virtualization
What are BYOD security measures?
Educate
◦ People can be your
weakest link
◦ Social engineering can
target specific people
◦ Some are unaware of
threats and the need for
a BYOD policy
◦ New threats are always
emerging
Secure
◦ Secure physical systems
◦ Wipe devices if they go
missing
◦ Physical security policies
to minimize risk
◦ Perform regular security
audits
Security is an ongoing process!
Where can I learn more about BYOD?
http://community.spiceworks.com/mobile/mdm_byod

More Related Content

What's hot

Mobile security
Mobile securityMobile security
Mobile security
home
 
infosec_for_journalists_2016
infosec_for_journalists_2016infosec_for_journalists_2016
infosec_for_journalists_2016
Justin Giles
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
John Palfreyman
 

What's hot (20)

Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Internet google
Internet googleInternet google
Internet google
 
The Danger of the Future of Technology
The Danger of the Future of TechnologyThe Danger of the Future of Technology
The Danger of the Future of Technology
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol review
 
Implementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD EraImplementing Enterprise Wireless Security Policy in the BYOD Era
Implementing Enterprise Wireless Security Policy in the BYOD Era
 
infosec_for_journalists_2016
infosec_for_journalists_2016infosec_for_journalists_2016
infosec_for_journalists_2016
 
Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentCybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile Environment
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 

Viewers also liked

Ainhoa joel-còmic-fotos5
Ainhoa joel-còmic-fotos5Ainhoa joel-còmic-fotos5
Ainhoa joel-còmic-fotos5
Saray128
 
Temario examen final etica profesional 2012
Temario   examen  final   etica  profesional   2012Temario   examen  final   etica  profesional   2012
Temario examen final etica profesional 2012
sandraruthi
 
Codigo de etica_iii
Codigo de etica_iiiCodigo de etica_iii
Codigo de etica_iii
moniqueli
 
Final program 11 27-12
Final program 11 27-12Final program 11 27-12
Final program 11 27-12
dwestenberger
 
Authentication & Authoritation
Authentication & AuthoritationAuthentication & Authoritation
Authentication & Authoritation
melidevelopers
 
El continente asiatico
El continente asiaticoEl continente asiatico
El continente asiatico
coreadelsur
 
Recuperacion de proceso de ofimatica
Recuperacion de proceso de ofimaticaRecuperacion de proceso de ofimatica
Recuperacion de proceso de ofimatica
melizacolqui
 

Viewers also liked (19)

Уз малу помоћ мојих пријатеља
Уз малу помоћ мојих пријатељаУз малу помоћ мојих пријатеља
Уз малу помоћ мојих пријатеља
 
Ainhoa joel-còmic-fotos5
Ainhoa joel-còmic-fotos5Ainhoa joel-còmic-fotos5
Ainhoa joel-còmic-fotos5
 
Temario examen final etica profesional 2012
Temario   examen  final   etica  profesional   2012Temario   examen  final   etica  profesional   2012
Temario examen final etica profesional 2012
 
Come to Sevilla. vídeo avi
Come to Sevilla. vídeo aviCome to Sevilla. vídeo avi
Come to Sevilla. vídeo avi
 
Hola
HolaHola
Hola
 
Descentralização, Desconcentração e Dimensão Territorial da Política de CT&I ...
Descentralização, Desconcentração e Dimensão Territorial da Política de CT&I ...Descentralização, Desconcentração e Dimensão Territorial da Política de CT&I ...
Descentralização, Desconcentração e Dimensão Territorial da Política de CT&I ...
 
08 Monteil:Rejuvenating Creme
08 Monteil:Rejuvenating Creme08 Monteil:Rejuvenating Creme
08 Monteil:Rejuvenating Creme
 
Projek 3
Projek 3Projek 3
Projek 3
 
Codigo de etica_iii
Codigo de etica_iiiCodigo de etica_iii
Codigo de etica_iii
 
5 Keys to Connecting with IT Pros in Social Communities
5 Keys to Connecting with IT Pros in Social Communities5 Keys to Connecting with IT Pros in Social Communities
5 Keys to Connecting with IT Pros in Social Communities
 
La Rotonda del Laurel
La Rotonda del LaurelLa Rotonda del Laurel
La Rotonda del Laurel
 
Оштро перо 2.круг
Оштро перо 2.кругОштро перо 2.круг
Оштро перо 2.круг
 
Discussion worksheet
Discussion worksheetDiscussion worksheet
Discussion worksheet
 
Final program 11 27-12
Final program 11 27-12Final program 11 27-12
Final program 11 27-12
 
Authentication & Authoritation
Authentication & AuthoritationAuthentication & Authoritation
Authentication & Authoritation
 
Eduardo Fernández Luiña - Austrian public choice
Eduardo Fernández Luiña - Austrian public choiceEduardo Fernández Luiña - Austrian public choice
Eduardo Fernández Luiña - Austrian public choice
 
El continente asiatico
El continente asiaticoEl continente asiatico
El continente asiatico
 
Recuperacion de proceso de ofimatica
Recuperacion de proceso de ofimaticaRecuperacion de proceso de ofimatica
Recuperacion de proceso de ofimatica
 
Presentation1
Presentation1Presentation1
Presentation1
 

Similar to Avoiding a BYOD Blowup!

Similar to Avoiding a BYOD Blowup! (20)

Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
 
cyber security
cyber securitycyber security
cyber security
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Biometric System Penetration in Resource Constrained Mobile Device
Biometric System Penetration in Resource Constrained Mobile DeviceBiometric System Penetration in Resource Constrained Mobile Device
Biometric System Penetration in Resource Constrained Mobile Device
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptx
 
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory
 
Cyber security and mobile devices
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devices
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Mobile security management
Mobile security managementMobile security management
Mobile security management
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
 
880 st011
880 st011880 st011
880 st011
 

More from Spiceworks Ziff Davis

The Balance of art & Science: Tech Marketing To-Dos in Spiceworks
The Balance of art & Science: Tech Marketing To-Dos in SpiceworksThe Balance of art & Science: Tech Marketing To-Dos in Spiceworks
The Balance of art & Science: Tech Marketing To-Dos in Spiceworks
Spiceworks Ziff Davis
 

More from Spiceworks Ziff Davis (20)

Are You an IT Geek?
Are You an IT Geek?Are You an IT Geek?
Are You an IT Geek?
 
Windows Server 2003 Lifecycle
Windows Server 2003 LifecycleWindows Server 2003 Lifecycle
Windows Server 2003 Lifecycle
 
5 Signs You're Up to Spice!
5 Signs You're Up to Spice!5 Signs You're Up to Spice!
5 Signs You're Up to Spice!
 
Hiring Managers Tell All
Hiring Managers Tell AllHiring Managers Tell All
Hiring Managers Tell All
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.
 
Milking Spiceworks for all IT's worth
Milking Spiceworks for all IT's worthMilking Spiceworks for all IT's worth
Milking Spiceworks for all IT's worth
 
Managing the mobile takeover
Managing the mobile takeoverManaging the mobile takeover
Managing the mobile takeover
 
Intro to the Spiceworks Help Desk
Intro to the Spiceworks Help Desk Intro to the Spiceworks Help Desk
Intro to the Spiceworks Help Desk
 
Beancounters: Friend or Foe?
Beancounters: Friend or Foe? Beancounters: Friend or Foe?
Beancounters: Friend or Foe?
 
Bang on tips for running a successful IT service business
Bang on tips for running a successful IT service businessBang on tips for running a successful IT service business
Bang on tips for running a successful IT service business
 
Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!
 
Group Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life EasierGroup Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life Easier
 
Spiceworks Unplugged - Seattle!
Spiceworks Unplugged - Seattle!Spiceworks Unplugged - Seattle!
Spiceworks Unplugged - Seattle!
 
Top 3 demand gen challenges
Top 3 demand gen challengesTop 3 demand gen challenges
Top 3 demand gen challenges
 
On Your Mark! Getting ready and set to spice IT up in Spiceworks.
On Your Mark! Getting ready and set to spice IT up in Spiceworks. On Your Mark! Getting ready and set to spice IT up in Spiceworks.
On Your Mark! Getting ready and set to spice IT up in Spiceworks.
 
The IT Buyer's Path to Purchase
The IT Buyer's Path to PurchaseThe IT Buyer's Path to Purchase
The IT Buyer's Path to Purchase
 
You've got email!
You've got email!You've got email!
You've got email!
 
US Presidents and the Evolution of Technology
US Presidents and the Evolution of TechnologyUS Presidents and the Evolution of Technology
US Presidents and the Evolution of Technology
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshare
 
The Balance of art & Science: Tech Marketing To-Dos in Spiceworks
The Balance of art & Science: Tech Marketing To-Dos in SpiceworksThe Balance of art & Science: Tech Marketing To-Dos in Spiceworks
The Balance of art & Science: Tech Marketing To-Dos in Spiceworks
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Avoiding a BYOD Blowup!

  • 1. Avoid a BYOD Blowup! Securing mobile devices @supertsai Peter Tsai, Spiceworks IT Content Guru
  • 3. BYOD = Bring Your Own Danger • What are BYOD & Mobile Security? • Why is mobile security Important? • What are BYOD risks / threats? • How the heck to guard against threats? • Security, an ongoing process Device
  • 4. With Special Guest Joe Foran IT Director - Bridgeport, CT 20 years in IT A+, CCA, CNE, MCITP, MCP (XP), MCSE, Network+, Security+, Server+
  • 5. What are BYOD & Mobile Security? Bring Your Own Device (BYOD) Policy of letting employees to bring their own mobile devices to work, and allowing those devices to access the company network. Mobile Devices include: laptops, tablets, and smart phones BYOD BYOB
  • 6. How many Ds are there in BYOD? More than 1 billion people have a smartphone 1 in 3 American adults owns a tablet 500 million laptops are sold every year worldwide All of these devices can connect to networks through Wi-Fi (or a hard wire) SO MANY DEVICES! OMG!
  • 7. Why is Mobile Security Important? A weak BYOD policy could result in ◦ Exposed data ◦ Theft of sensitive information ◦ Devices infected with viruses ◦ Websites or accounts hijacked ◦ Data corruption ◦ System downtime ◦ Financial Loss / Damage to brand ◦ Compliance penalties ◦ Bandwidth constraints BYOD DOG HACKING YOUR INTERNETS
  • 8. What are Examples of Security FAILs? Data Breaches / Data Theft o Target o Neiman Marcus o JC Penney o 7-Eleven o Dow Jones servers o US Military o Iran nuclear centrifuges o Social Security numbers at data brokers o My Facebook
  • 9. What are Examples of Security FAILs? NSFW NSFW NSFW
  • 10. What are MDM and MAM? MDM (Mobile Device Management) Software that IT can use to monitor, inventory, manage, lock down, control, encrypt, track, wipe, and enforce policies on mobile devices MAM (Mobile Application Management) Like MDM, but MAM can lock down specific apps on a device instead of the entire device. MAM also helps limit the sharing of corporate data among apps.
  • 11. What are BYOD security measures? Layered Approach to Security Authenticate Protect Educate Secure NETWORK SECURED!
  • 12. What are BYOD security measures? Authenticate ◦ Password protect devices ◦ Restrict access to networks ◦ Disallow anonymous access ◦ Consider a separate guest network Protect ◦ Encrypt data ◦ Limit external access ◦ Antivirus / Antimalware ◦ Patch management ◦ Firewalls ◦ Application control ◦ Network monitoring ◦ No “jailbreaking” ◦ Desktop virtualization
  • 13. What are BYOD security measures? Educate ◦ People can be your weakest link ◦ Social engineering can target specific people ◦ Some are unaware of threats and the need for a BYOD policy ◦ New threats are always emerging Secure ◦ Secure physical systems ◦ Wipe devices if they go missing ◦ Physical security policies to minimize risk ◦ Perform regular security audits
  • 14. Security is an ongoing process!
  • 15. Where can I learn more about BYOD? http://community.spiceworks.com/mobile/mdm_byod