There sure are a lot of smartphones and tablets the workplace these days! With the recent BYOD explosion, more and more devices have access to your company’s critical data. What is an IT pro to do to mitigate the threat posed by these devices? Learn how to protect your workforce, secure your network, and educate your users about threats.
3. BYOD = Bring Your Own Danger
• What are BYOD & Mobile Security?
• Why is mobile security Important?
• What are BYOD risks / threats?
• How the heck to guard against threats?
• Security, an ongoing process
Device
4. With Special Guest
Joe Foran
IT Director - Bridgeport, CT
20 years in IT
A+, CCA, CNE, MCITP, MCP (XP), MCSE, Network+, Security+, Server+
5. What are BYOD & Mobile Security?
Bring Your Own Device (BYOD)
Policy of letting employees to bring their
own mobile devices to work, and allowing
those devices to access the company
network.
Mobile Devices include:
laptops, tablets, and smart phones
BYOD
BYOB
6. How many Ds are there in BYOD?
More than 1 billion people have a
smartphone
1 in 3 American adults owns a tablet
500 million laptops are sold every year
worldwide
All of these devices can connect to
networks through Wi-Fi (or a hard wire)
SO
MANY
DEVICES!
OMG!
7. Why is Mobile Security Important?
A weak BYOD policy could result in
◦ Exposed data
◦ Theft of sensitive information
◦ Devices infected with viruses
◦ Websites or accounts hijacked
◦ Data corruption
◦ System downtime
◦ Financial Loss / Damage to brand
◦ Compliance penalties
◦ Bandwidth constraints
BYOD DOG
HACKING
YOUR
INTERNETS
8. What are Examples of Security FAILs?
Data Breaches / Data Theft
o Target
o Neiman Marcus
o JC Penney
o 7-Eleven
o Dow Jones servers
o US Military
o Iran nuclear centrifuges
o Social Security numbers at data brokers
o My Facebook
10. What are MDM and MAM?
MDM (Mobile Device Management)
Software that IT can use to monitor, inventory,
manage, lock down, control, encrypt, track,
wipe, and enforce policies on mobile devices
MAM (Mobile Application Management)
Like MDM, but MAM can lock down specific
apps on a device instead of the entire
device. MAM also helps limit the sharing of
corporate data among apps.
11. What are BYOD security measures?
Layered Approach to Security
Authenticate
Protect
Educate
Secure
NETWORK
SECURED!
12. What are BYOD security measures?
Authenticate
◦ Password protect
devices
◦ Restrict access to
networks
◦ Disallow anonymous
access
◦ Consider a separate
guest network
Protect
◦ Encrypt data
◦ Limit external access
◦ Antivirus / Antimalware
◦ Patch management
◦ Firewalls
◦ Application control
◦ Network monitoring
◦ No “jailbreaking”
◦ Desktop virtualization
13. What are BYOD security measures?
Educate
◦ People can be your
weakest link
◦ Social engineering can
target specific people
◦ Some are unaware of
threats and the need for
a BYOD policy
◦ New threats are always
emerging
Secure
◦ Secure physical systems
◦ Wipe devices if they go
missing
◦ Physical security policies
to minimize risk
◦ Perform regular security
audits