Security Ebook Conceptual 0607cs13 2
Upcoming SlideShare
Loading in...5
×
 

Security Ebook Conceptual 0607cs13 2

on

  • 256 views

An interactive guideI co-wrote for Rogers filled with 15 practical tips, suggestions and ideas you can implement right now to help secure your mobile business.

An interactive guideI co-wrote for Rogers filled with 15 practical tips, suggestions and ideas you can implement right now to help secure your mobile business.

Statistics

Views

Total Views
256
Views on SlideShare
256
Embed Views
0

Actions

Likes
1
Downloads
3
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Security Ebook Conceptual 0607cs13 2 Security Ebook Conceptual 0607cs13 2 Document Transcript

    • Securing your mobile successit’s time to sToP thinking about security as a reason to say‘no’ and sTArT thinking about it as a reason to say ‘yes’.Advances in technology and mobility come at in this guide you’ll find 15 practical tips,us fast and furiously. successful businesses will suggestions and ideas you can implement rightembrace the technologies that spur growth but now to help secure your business. if you want toalso remain aware of potential risks and have a dig deeper, we offer links to many other sources ofplan to deal with them. inspiration.it starts with understanding the many available Dive in now for ideas on how to securely harnesssecurity features and tools on the market. This will the power of mobility.help you make better decisions about the wirelesstechnologies that are best for your business. A GUIDE TO SECURING YOUR BUSINESS 2
    • 15 wAys To secure your businessPractical Business security advice 1. what’s your organization’s mobile security iQ? » 2. Get educated: learn from other businesses » 3. Kickstart a new iT risk Attitude »device, aPP & network tiPs 4. Discover built-in blackberry Defenses » 5. beyond Pass-code lock: Keeping your iPhone and Data safe » 6. is Android secure enough for business? » 7. master mobile Device management » 8. securing Personal Devices at work » 9. Do you Know where Those Apps Go? »10. Hit the road Jack: mobile computing made safe »11. shut out Hackers: secure your wireless wi-Fi network »12. make network Downtime a Thing of the Past »emerging technology tiPs13. securing the cloud »14. i spy: monitoring your business from Afar »15. Protecting against emerging Threats » A GUIDE TO SECURING YOUR BUSINESS 3
    • 1 What’s Your Organization’s Mobile Security iQ? How does your business rank when it comes to proactive security?don’t assume your Business is secure. Find out For sure.Why It mattersAssessing the security risk of the technology, processes and peoplethat support your business is the first step in securing your business.self assessment tools, like the ones to the right, are easy, fast andtypically free. so why not start now?What It Can Do For your BusIness identify security risks and monitor your • Help you evaluate where your business stands and give you ideas ability to respond to threats in your on how to mitigate future risk. computing environment with Microsoft’s Security Assessment Tool. • identify the greatest risks to your business and prioritize which to tackle first. • create a “wake-up call” for your leadership team on risks and priorities.3 thInGs you Can Do noW 1. Take the quiz. no matter what your score, you’ll find opportunity for improvement or reinforcement of what to keep doing. 2. Share the results with your staff to educate them on risks. 3. Build awareness with your leadership team. share your scores, including how you fared on existing security measures, to help get Find out how well your business is buy-in for future security proposals. protecting personal information and how compliant you are with mandatory regulations with this self assessment tool from the office of the Privacy commissioner of canada. A GUIDE TO SECURING YOUR BUSINESS 4
    • 2 get educated: Learn from Other Businesses What are successful companies doing to protect their business?get security survey highlights and Practical moBile advice.Why It matterssmart companies are becoming more proactive about security, deployingsecurity processes and security tools to protect their business and gain acompetitive edge. learn from them in the latest security research.What It Can Do For your BusIness • Fuel change – security best practices from other businesses can Get highlights from the 2010 cio security survey and practical mobile help motivate your leadership team to act now. security tips with this webinar from iT • Keep you focused on what matters – figure out where to focus world canada. your efforts and how to prioritize security initiatives. read this white paper • secure your business faster with practical ideas from companies for a realistic vision of like yours. how mobile security needs to be considered to help businesses grow3 thInGs you Can Do noW 1. read free annual security reports – Take a look back at the past year and ahead to the threats we can expect. Access a full list of free reports from security companies, publishing organizations and Deep dive into security best practices with the iT research businesses here. 2012 Global state of 2. Subscribe to free ongoing security news e-blasts or blog posts – information security survey® from Price stay on top of the latest threats with expert advice from iT publishing waterhouse coopers. companies like iT world canada, Tech republic or cneT. 3. Be part of the conversation – security is a hot topic. now is the time to reach out to your network of tech colleagues or attend a mobile tech security event for advice. A GUIDE TO SECURING YOUR BUSINESS 5
    • 3 Kickstart a new iT risk Attitude Your employees: responsible risk takers or data daredevils?Bring risk management out oF the it dePartment and into everyone’s joB.Why It mattersHuman error is the primary cause for security breaches in businesstoday, yet most organizations provide little on-going securityeducation to non-iT staff. with the rest of the company thinkingrisk and security is iT’s responsibility, it’s wise to consider making risk Find out how to make riskmanagement everyone’s job. management more personal in your business with this blog post.What It Can Do For your BusIness • significantly increase the level of security in your business. • build a culture of security and responsibility. • Help your business be more proactive in new technology decisions.3 thInGs you Can Do noW 1. Make all employees risk managers. Add accountability for risk management to performance goals for everyone across the company. learn about what global iT managers and 2. Build a comprehensive communication plan that teaches cios are doing to better mitigate risk with this Global risk study from ibm. employees about emerging threats, security policies, and best practices. 3. commit to ongoing risk management training. The lack of end-user training is a growing threat to iT security. want more? Get tips on how to help employees understand data risk management here » A GUIDE TO SECURING YOUR BUSINESS 6
    • 4 Discover Built-in BlackBerry Defenses Your BlackBerry smartphone is a security powerhouse. Are you harnessing its power for good?get BlackBerry security tiPs and tricks straight From the Pros.Why It mattersover the last decade, rim has built a sound reputation on the strengthof its security features. This has much to do with business enterprise(bes) software. but even the best software doesn’t protect against ®uninformed or negligent blackberry users. implementing a few quickand easy safeguards can go a long way in securing your devices andthe information on them. check out this webinar to find out more about blackberry built-in security tools. ®What It Can Do For your BusIness • Protect against unwanted applications and malware. • manage multiple devices on rim’s stable and secure operating system. want more? • Protect your sensitive data no matter how it’s accessed. check out the blackberry security ® knowledge base for a wealth of information on all aspects of security3 thInGs you Can Do noW for blackberry devices. ® 1. Set a password policy with a minimum length of 5 characters and Get 5 tips from cio.com to keep your a maximum of 10 password tries before automatic device self wipe. blackberry smartphone safe here. ® click here to find out how to add a password to your smartphones. 2. encrypt data stored on your device and/or your microsD media card in four simple steps. click here to find out how. 3. Wipe devices before they are passed on to another employee. Go to the options menu on the device, select security, then security wipe. it will ask you to type in BlackBerry to complete the wipe. A GUIDE TO SECURING YOUR BUSINESS 7
    • 5 Beyond Pass-code Lock: Keeping Your iPhone and Data Safe Have you thought beyond the basics?learn how to keeP inFormation secure on Business iPhones.Why It mattersApple has polished the business features of its operating system withsecurity that stretches well beyond pass-code locks. From exchange andremote wipe support, security and configuration to VPn options andencryption, Apple users can now keep their iPhones and the data they ®access safe. Hear what Apple has to sayWhat It Can Do For your BusIness about iPhone security in this ® on-demand webinar. • Provide a layered approach to keeping your information secure with device policies, restrictions and encryption. • Protect all data stored on devices with hardware encryption. • clear data and settings remotely in the event of loss or theft.3 thInGs you Can Do noW 1. Manage iPhone through the central console. set up ® accounts, set restrictions, and configure devices quickly and remotely using iPhone 4’s console for mobile device ® management. click here to find out how. Get informed: everything you want to know about Apple’s security 2. Set up VPn access and teach your employees how to turn it on, features for iPhone here. ® so you can communicate private information securely over a public network. Get help on setting up VPn here. 3. get a security app. security apps can add another layer of protection for business, from biometric security apps that authenticate users with want more? the touch of a finger, to anti-malware or even alarms that protect your Get more security tips on how to secure device from theft or loss. your data from Apple here. A GUIDE TO SECURING YOUR BUSINESS 8
    • 6 is Android Secure enough for Business? Did you know the latest Android devices are packed with better security features?get Better control and security over Personal and Business devices.Why It matterswhy should you care about Android ? employees are increasingly opting to ™bring their personal devices to work. Android , Google’s operating system that ™powers many of the world’s smartphones, gives you the ability to manage andsecure a good portion of these devices from one simple operating system. Get security advice straight from Android™ in this on-demand webinar webinar here.What It Can Do For your BusIness • better control over personal and business mobile devices at work. • Access to a universe of third-party security solution providers who Get informed: can quickly custom build secure apps for your business on 5 things you Android’s open platform. should know about Android ™ • set-up, configure and perform frequent security updates with for business. relatively little effort using auto-discovery features.3 thInGs you Can Do noW 1. Stop saying ‘no’ to personal devices. The last thing you want is want more? a rogue experience at your company. An informed iT department is the best way to ensure your business is secure. Get advice on how learn 6 ways to protect your Google phone here. to manage personal devices at work here. check out this essential guide to Android ™ 2. Adopt mobile device management (MDM). This is a critical part at work for business users here. of managing the plethora of Android devices, so take the time to ™ Get 10 tips to turn Android into a ™ chose features wisely. Get mDm advice here. business phone here. 3. use google apps to manage Android security policies. Google Apps Device Policy Administration can help you enforce policies and remotely wipe lost or stolen devices. A GUIDE TO SECURING YOUR BUSINESS 9
    • 7 Master Mobile Device Management Are you managing mobile technology on the fly?centralize your control. minimize the risk.Why It matters Find out how mobilemany businesses have a myriad of devices and operating systems accessing device management can benefit yourcompany data. How prepared are you to manage yours? mobile device business with thismanagement (mDm) tools are quickly becoming a must-have. not only can white paper from Juniper andthey help centralize the control, security and costs of these devices, but they enterprise strategycan also minimize the time spent on maintenance. Group.What It Can Do For your BusIness This e-book is chock • manage assets, inventory management, software licenses, security full of juicy discussions controls, and more. on the latest trends in mobility. Topics covered • Quickly authenticate your staff, regardless of their device. include mobile device • speed up device and software deployment and reduce downtime by management and app development. skip to diagnosing and fixing problems remotely. page 70 for specific advice on device management tools.3 thInGs you Can Do noW 1. Prioritize mobile device security and management needs. Figure 6, page 7 of Juniper’s whitepaper has a great list to get you started. 2. choose an integrated MDM solution instead of many individual tools. ideally it should integrate with network access controls, support all popular devices and cover the full life cycle of devices. check out these mDm players: Juniper, mobileiron and Trellia. 3. Mean what you say: enforce policy. monitor device usage, limiting or removing privileges where necessary, and blocking insecure sites or networks. A GUIDE TO SECURING YOUR BUSINESS 10
    • 8 Securing Personal Devices at Work is it time for a Bring Your Own Device (BYOD) policy for your business?give your team the tools they need to securely access corPorate dataFrom Personal smartPhones or taBlets.Why It mattersToday’s workers are bringing their own personal smartphones, tablets andlaptops to the office for both personal and professional use. many businesseshave accepted this reality and are creating strategies that offer employees morefreedom in exchange for a higher level of personal accountability.What It Can Do For your BusIness • Keep employees happy and productive while reducing cost of ownership for devices. Find out how your business can capitalize • support telecommuters and create a more flexible work on byoD in this webcast and white paper environment from unisys. • reduce unauthorized access to company data from staff-owned devices.3 thInGs you Can Do noW want more? Get tips from unisys on developing a 1. Set clear expectations and policies. be clear about which byoD policy here. personal mobile devices are allowed in the workplace and how 7 questions you should answer before you you expect staff to keep these devices safe (managing passwords, implement byoD at your company. sybase. using only sanctioned apps etc.). see how smart companies are letting 2. invest in a mobile device management solution. retain control employees use their personal gadgets to and visibility over all devices from a central platform, installing do their jobs. wall street Journal. software that creates walls between corporate and personal data and enables data blocking or wiping. 3. revisit reimbursed policies. some companies are moving to a shared-responsibility model, implementing optional byoD policies and supporting them with grants, stipends, and loans. A GUIDE TO SECURING YOUR BUSINESS 11
    • 9 Do You Know Where Those Apps go? got the latest must-have business app? How do you stop it from accessing off-limit data?make sure to include aPPs as Part oF your regular moBile security check.Why It mattersApps can pack a lot of power into your pocket. before inviting them in, makesure you know the full capabilities of these programs, including the amountof information they take from your employees’ devices. including apps as part Find out how mobile apps access personal data and explore security with this reportof your regular mobile security check can help keep your business safe. from Lookout Security.What It Can Do For your BusIness • Prevent staff from unintentionally exposing your network and devices to viruses and hackers. • limit the downloading of malicious, pirated or repackaged applications from unofficial websites. • ensure that apps on business-used devices are not accessing sensitive business data without your permission or knowledge. watch this video from No Panic Computing to learn how to change Facebook privacy3 thInGs you Can Do noW settings to stop it from accessing employee information. 1. Say ‘no’ to app permissions. Did you know nearly one third of apps in major apps stores access users’ locations? And an increasing number also access contacts? make sure users know when to say ‘no’ to apps that are requesting this kind of information access. 2. create a pool of approved apps. Define app download policies and make sure users only download (and update) approved software. 3. use application access control software. not all apps are what they seem. These tools look at how your device is behaving and, if it sees something suspicious, quarantines and even remote wipes it. A GUIDE TO SECURING YOUR BUSINESS 12
    • 10 Hit the road Jack: Mobile computing Made Safe A few simple changes to the way you use mobile computers can go a long way in protecting your business.Protect your moBile devices and the inFormation they access From theFt.Why It mattersyour business is contained on your employees’ laptops, notebooks andtablets, yet the increasing complexity of technology, connectivity, securityand confidentiality creates unprecedented risk. whenever sensitivedata is stored outside firewalls or accessed through wi-Fi and remotenetworks, it’s smart to take added security measures to minimize risk.What It Can Do For your BusIness Get tips on how to make mobile computing safe in this on-demand • Help employees work safely from home or on the road. webcast. • Protect your business from theft of intellectual property or valuable devices. mobile Computing Video tips from no Panic Computing • limit access to important data to the intended user. Tip 1: learn how biometrics,3 thInGs you Can Do noW passwords and encryption can 1. Save or backup documents to a shared network drive or the protect your laptops cloud, not a hard drive. Protect important files from computer and tablets here. crashes and laptop losses. Tip 2: learn how 2. encrypt Microsoft Word docs. encrypting a document is as ® to identify phishing simple as right clicking and selecting “encrypt”. why not enforce scams with this video from No Panic encryption? Computing here. 3. Advise employees of simple do’s and don’ts. Don’t leave it in a car, do carry it in a backpack, don’t fall for common phishing scams. Tip 3: learn how to avoid a common security threat for windows XP here. A GUIDE TO SECURING YOUR BUSINESS 13
    • 11 Shut Out Hackers: Secure Your Wireless network Are you underestimating the security of your Wi-Fi network?hackers love to Penetrate networks. make sure yours is secure.Why It mattersTo protect your business, it’s important to keep outsiders from accessing Get quick tips onyour wi-Fi network. Don’t hold off on protecting your network; hackers are working wirelessly, both in and out ofincreasingly focusing on small- and medium-sized businesses. Fortunately, there the office.are simple, low-effort things you can do now to improve network security.What It Can Do For your BusIness • Protect your network from disruption, which can jeopardize confidential customer data, interfere with supply chain activities and result in lost revenue. • Keep your business compliant with canadian privacy regulations such as PiPeDA. • Give your mobile staff a secure way to access your network from public learn from cisco in this video: what hotspots when travelling. are bots, Viruses, malware, spyware?3 thInGs you Can Do noW 7 considerations for your wireless 1. change wireless router default settings and stop network for you to think about, broadcasting your network iD. click here to find out how. courtesy of Focus 2. Minimize signal leakage. move your router to the middle of the research. office and turn it off if not in use for long periods of time. 3. invest in a virtual private network (VPn) so that mobile workers can securely connect to your network from public wi-Fi hotspots want more? while on the road. click here for more information on VPn click here for a quick lesson on wi-Fi security with this free online class from Hewlett-Packard. A GUIDE TO SECURING YOUR BUSINESS 14
    • 12 Make network Downtime a Thing of the Past How much revenue do you lose during internet outages? What’s the impact to your reputation if your POS system goes down?keeP your Business uP and running when your Primary network goes down.Why It matters How much isDowntime for critical systems can mean huge revenue and productivity network downtimelosses and impact your reputation. it pays to have a back-up plan when costing your business? Find outyour primary access to the internet goes down. wireless technology can with our Point ofhelp keep your business up and running. sale roi calculator and see how much you save with aWhat It Can Do For your BusIness secure wireless back up plan in place. • ensure continuous up-time for transactions, communications, enterprise applications and other critical systems. • Keep your business running during disease outbreaks, inclement Find out how blinds To Go weather, or natural disasters. addressed their need for a failover • Protect your reputation, customer confidence and employee morale. solution for their Pos systems.3 thInGs you Can Do noW 1. identify mission critical systems. understanding which systems require 100% uptime is the first step in building a back-up plan. 2. Find out how much network downtime is really costing your business. self assessment tools can help you quantify how much downtime is costing your business so you can build the business case for a back-up network access solution. see how critical network Access 3. choose a back-up solution that includes network and carrier can help your business diversity. backing up a main wireline connection with wireless network access from another carrier significantly reduces your vulnerability. A GUIDE TO SECURING YOUR BUSINESS 15
    • 13 Securing the cloud Are you considering putting services in the cloud?think aBout how to Protect your data BeFore you move it to the cloud.Why It matters check out this iTcloud computing delivers on-demand, scalable resources accessible world canada whitefrom just about anywhere, through the internet. before moving aspects paper which examines canadian companies andof your business to the cloud, it’s a good idea to think about how to who is moving to thekeep your data secure once it’s there. cloud – as well as when and why.What It Can Do For your BusIness Get insights from Price • Access the latest technology to stay agile and able to adapt to waterhouse coopers on changing business environments and security threats. different cloud models and how to secure them • Deliver on-demand self-service to employees without the risk. in this white paper. • expand what your company does and who you collaborate with.3 thInGs you Can Do noW 1. classify data based on how critical it is to your business. before check out this webcast from www.techrepublic. you decide what data to move to the cloud, consider your risk com which covers the tolerance and legal or compliance responsibilities. primary considerations to protect your most 2. Perform due diligence when choosing cloud suppliers. precious assets in the Get references. research their audit process. negotiate a strong cloud. service level agreement (slA) that covers roles and responsibilities, data storage and disposal, and disaster recovery plans. 3. Know where your data is living. if your cloud provider is not based in your country or province, the servers that store your data may be subject to the laws of another country. This could make your business noncompliant with local regulatory requirements or expose information to authorities in other jurisdictions. A GUIDE TO SECURING YOUR BUSINESS 16
    • 14 i Spy: Monitoring Your Business from Afar M2M: How machines can help you keep an eye on your business.remotely monitor and Protect staFF, Fleets and assetswith wirelessly connected machines.Why It matters Find out howyou’ve probably heard the term machine-to-machine (m2m) being tossed Pita Pit used videoaround with increasing frequency over the last year or two. These services surveillance to address an outbreak of inventorylet you remotely monitor and protect your fleet, assets and staff from your and cashier-relatedsmartphone or tablet, using wirelessly connected devices. shrinkage at their stores.What It Can Do For your BusIness • secure multiple warehouses, sites, vehicles, buildings or stores. see how Highway Technical engineering • reduce theft: know where your inventory, freight and assets are services monitors its at all times. fleet and keeps mobile workers safe. • Keep remote workers safe and connected to security response teams.3 thInGs you Can Do noW explore how 1. connect your on-premise surveillance cameras to a mobile app m2m can help you remotely to monitor you business from anywhere. see how Pita Pit used monitor and video surveillance to reduce shrinkage here. secure your business. 2. install fleet tracking systems in your vehicles to better track your valuable assets. see how Highway Technical engineering services monitors its fleet and keeps mobile workers safe here. 3. Provide connected devices to field workers in hazardous conditions to monitor their safety. check out vendors like blackline GPs, Tsunami solutions and mentor engineering. A GUIDE TO SECURING YOUR BUSINESS 17
    • 15 Protecting Against emerging Threats What impact do social media networks, online games or software have on security?keeP in mind that emerging threats can From Both withinand outside oF your organization.Why It mattersAlthough mobile malware is still in its early days, it’s smart to be aware learn about emergingof emerging threats and the ways to defend against them. look ahead, threats and how theykeep informed and protect against the leaking of sensitive information to are impacting businesses here.the public by employees. Prevent external scams delivered through socialmedia sites or repackaged games or software.What It Can Do For your BusIness Get a view of what’s • Keep employees alert and prepared for the latest threats and hitting the top 5 educated on acceptable behaviour. cybercrimes and scams today here. • Keep networks and business devices safe from the latest cybercriminal threats. • increase the confidence of your customers, partners and staff in the security of their data. Get informed commentary on emerging3 thInGs you Can Do noW trends in attacks, malicious code 1. create a policy to set expectations for social media users. activity, phishing, and spam here. with social media malware on the rise, shaping user behaviour and increasing governance for social network use is a smart choice. 2. install anti-malware software regularly. with the increasing speed of malware changes and distribution, it’s important to make sure anti-malware software on all business mobile devices is want more? updated regularly. learn about the social media sites, and hear what small and medium sized 3. consider data loss prevention tools. Prevent inadvertent or businesses are doing to protect against intentional exposure of sensitive business information by identifying emerging threats here. critical content then tracking and blocking it from being moved. A GUIDE TO SECURING YOUR BUSINESS 18
    • Are YOu reADY?STOP worrying. STArT now.security should be a source of positive motivation, because good security is key to winning yourcustomer’s trust. This guide is filled with common sense (but often overlooked) things you can startdoing today.stop worrying. mobile devices actually have many built-in security advantages over their desktoppredecessors. And, as seen in this guide, there are many available device features that can simply beturned on, or resources that can be accessed for free.so don’t delay. Try putting one new security idea into action today, or pick a few and build them intoyour security plan.For more information on mobile security, or other communications challenges for business, email us now,or visit www.rogersbizresources.com.references to third-party advice and websites are made for your information only. ™rogers, rocket & mobius Design plus and relatedbrands marks and logos are trade-marks of or used under license from rogers communications inc. or an affiliate. blackberry®, rim andrelated names and logos are the property of research in motion limited and are registered and/or used in the u.s. and countries aroundthe world, used under license from research in motion limited. All other brand names are trade-marks of their respective owners.©2011 rogers communications A GUIDE TO SECURING YOUR BUSINESS 19