Your SlideShare is downloading. ×
0
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Mobile Device Management - Bring Your Own Device
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Mobile Device Management - Bring Your Own Device

358

Published on

Using the help of Cristiano Ronaldo, This slideshow aims to explains the 5 key risks associated with bringing your own device (BYOD) to the workplace, and Mobile Device Management.

Using the help of Cristiano Ronaldo, This slideshow aims to explains the 5 key risks associated with bringing your own device (BYOD) to the workplace, and Mobile Device Management.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
358
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. MOBILEDEVICES in theWORKPLACE: ur ity S ec K ey ks: 5 R is
  • 2. meetCRISTIANO
  • 3. CRISTIANO is a business man
  • 4. …and a trivia man
  • 5. C r i st ia n o ,Hey U KN OW…DI D YO
  • 6. …in 2011, Dubliners leftthousands of personalitems in taxis such as …
  • 7. as et o fF AL SE TE ET H
  • 8. GS DO otw
  • 9. C ATo ne
  • 10. a few TOILET SEATS
  • 11. SH ES a lA un erf
  • 12. an d aB AB Y
  • 13. I al mostOh ! Andforgo t. . .
  • 14. 25,000E PHONESMOBIL
  • 15. And that’s just in DUBLIN
  • 16. Many of those lost devices can store:10K 20K 200K 500KPHOTOS WORD DOCS EMAILS CONTACTS
  • 17. That’s a lot ofSENSITIVE INFO!
  • 18. Cristiano, Imag ineif YOUR PHON E landed in the wrong hands?
  • 19. Just think about how much CORPORATE D A TA would be at risk ?
  • 20. CRISTIANO’SConfidentialClient Info..
  • 21. And p hysicais just l acce one ty ssSE C U pe of R I TY TH R E AT!
  • 22. Wait, thereare more?
  • 23. Sadly, YES. In fact there 5 K EY S E CU are RITY RISKS everyone mu st know.
  • 24. CommunicationInterception
  • 25. LookFamiliar?
  • 26. Think back, wh en was thelast time you a ccessed a Wi-Fi hot spot ?
  • 27. Hmm, where was I?
  • 28. For companies with employees who use Wi-Fi hotspots … the stakes are high!
  • 29. Malicious Code
  • 30. Malware attacks ano longe re r confine d to PCs!
  • 31. In fact,malwa mobile re thre on the a t s ar e rise…
  • 32. ..and continue to affect the most prevalent mobile operating systems
  • 33. Here ’s an fact f inter or yo estinin 201 u Cr i g 1… stiano ,
  • 34. Before
  • 35. After
  • 36. w that’sWo ng!shocki
  • 37. DeviceAttacks
  • 38. Device atta cks aretypically de signed to g control of th a in e device an access cont d ent…
  • 39. …or attempta denial ofservice(DOS).
  • 40. DEVICE ATTACKSare similar to PCATTACKS of thepast, such as…
  • 41. Browser-based attacks Buffer overflow expectationsApplication-basedattacks
  • 42. l ca si s y sPh c e Ac
  • 43. Cristiano, ar en’t Mobile Devices the perfect travel compa nion?
  • 44. I mean they are…
  • 45. small
  • 46. portable
  • 47. and lightweight.
  • 48. But that also means, they are… 1. Easy to steal. 2. Leave behind.
  • 49. and rem emberOh , th is slide?
  • 50. 25 ,000 S MO BILE PHONE inleft in t axis in Dubl alone!
  • 51. ew hatAh, I se re. did they ou er d og.Y ou clev
  • 52. Insider Threats
  • 53. Threa t s c an from also c withi ome organ n you isatio r n.
  • 54. Malicious insiders can use mobile devices toleak important data.
  • 55. Sharing corporateinformation from a smartphone will..
  • 56. ..often circumvent robust monitoring systems, like Data Loss Prevention.
  • 57. al ly? Re y? rio uslSe
  • 58. no, REALLY!Yes Cr istia
  • 59. Lets revie w t he 5 Key S e cu r ity Risks one more time.
  • 60. Whether or not your company has formall yadopted mobile devi ces…
  • 61. They are in yourenterprise.
  • 62. So what should YOU do?
  • 63. Voice Engineer Ireland 1 244 9590 Phon e: 0 n@v ei.ie l: nla nigaEmai land : @V EI r e Tweet
  • 64. Sounds good to m e .

×