Your SlideShare is downloading. ×
Mobile Security Best Pract Gold Nugget
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Mobile Security Best Pract Gold Nugget

516
views

Published on

This is a PRIMER on Mobile Information Security Best Practices. Learn about device physical security, transmission encryption, spyware/anti-spyware.

This is a PRIMER on Mobile Information Security Best Practices. Learn about device physical security, transmission encryption, spyware/anti-spyware.

Published in: Business, Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
516
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
19
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Gold Lock 3G Encryption Mobile Information Security Best Practices Primer
  • 2. Summary The purpose of this Gold Nugget is to outline the basics of Mobile Information Security (MIS). It should be noted from the start that all the encryption, anti-malware, and company policy will not prevent 100% of information loss. These practices are based on the honest efforts off employees to protect their company's sensitive information. Intentional release of information is difficult, if not impossible, to prevent especially on mobile devices.
  • 3. Training and Policy A clear understanding of your company's MIS policies will help prevent accidental information loss and also provide a frame work for investigating information loss. Resources: www.cissp.com www.auerbach-publications.com
  • 4. Passwords The cell phone should be password protected if that feature is available. The password should block all access the device until a valid password is enabled. The password used should be as strong a password as technologically possible. Guidance on creating strong passwords can be found here
  • 5. Reporting Compromised Devices In the event your device is lost, stolen, misplaced, is suspected to be such, it should be reported to your IT department. Recovered devices should be taken to your IT department a cell phone dealer immediately for more information on checking for and removing spyware.
  • 6. Storing Information Sensitive or restricted data should never be stored on a cell phone, unless it can be encrypted. Keep in mind that encryption is no good if strong passwords are not effectively put into place and used.
  • 7. Transmission Security/Encryption Where possible, data transmissions from a cell phone should be encrypted. Hackers and corrupt carrier employees are able to intercept your conversations while in transit between devices and use/sell the information they steal. Encrypting your transmissions keeps the information from being useful as easily. The stronger encryption the less useful the information because of the effort to decrypt. Gold Lock 3G has the most robust encryption on the market, and is compatible with the most devices and networks . www.gold-lock.com
  • 8. Wireless Access/Bluetooth Wireless access, such as Ethernet, Bluetooth, etc., to the cell phone should be disabled when not in use to prevent unauthorized wireless access to the device. These should never be used when speaking about sensitive topics over your mobile device. It defeats the purpose of encrypting transmissions from the cell phone. Interception happens at the un-encrypted Bluetooth transmission and not the encrypted transmission from the phone
  • 9. Wireless Access/Bluetooth In general, keep your wireless connection on hidden mode unless you specifically need to be visible to others. Wireless access should be configured to query the user for confirmation before connecting to wireless networks. For example, when Bluetooth is on, select the “check with me before connecting” option to prevent automatic connections with other devices.
  • 10. Malware Malware comes in the form of spyware on mobile devices (smart phones in particular). Spyware can be installed with or without physical access to the device. Exercise caution when accepting applications sent via wireless or opening SMS attachments as they may include software harmful to your cell phone.
  • 11. Malware Capabilities
    • Remote Control
      • Video Camera
      • 18. Microphone
      • 19. GPS locater
      • 20. Device behaves as a bug. Can see and hear surrounding conversations.
  • 21. Anti-Malware Just as with PCs, smart phones have anti-malware software available. This software prevents and detects malware on your smart phone keeping conversations secure when using or around it. When joined with a strong transmission encryption software, like Gold Lock, your conversations are more secured from your microphone to the receiver's speaker. The Sigillu Total Security Phone provides this complete security and more.
  • 22. Conclusion This has been a short presentation to educate you on the general aspects of Mobile Information Security and alert you as to vulnerabilities of mobile devices. For more information please contact us at: [email_address] 954-376-5715 Ext 101 – Dealer Sales Ext 103 – End User Sales