Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Bryley - mobility in the work place

1,132 views

Published on

Learn about the proliferation of mobile technology in the work place and how to navigate the complex security issues it presents.

Published in: Technology
  • Login to see the comments

  • Be the first to like this

Bryley - mobility in the work place

  1. 1. Mobility in the Workplace Manage • Optimize • Secure™ – Since 1987
  2. 2. Today 1. Mobility is the most disruptive technology since PC introduced in 1981. 2. Mobility growth: • Mobile devices (2b) > desktops (1.3b) • Mobile traffic exceeded desktop in 2015 • Online time via mobility at 51% in USA • Mobile commerce 30% at $104.5B in ‘15 3. Traditional mobile device=SwissArmyknife: • Assistant, tour guide, gamer, entertainer • Camera, compass, flashlight, scanner • Alert, monitor, and sense Slide 2 Copyright 2016Bryley Systems Inc.
  3. 3. Trends 1. Integration: • Lifestyle – Fitness or gaming; image • Social integration – Search, messaging, video: Facebook video exceeds YouTube 2. Emerging technologies: • AI – Siri/Cortana; hands-free in vehicles • Wearables – Wrist-ware, fitness trainers, eye-ware, ear-ware, etc. – 39.5 million 3. Other changes: • Cell-service price wars • Cell-bandwidth freed by emerging Wi-Fi Slide 3 Copyright 2016Bryley Systems Inc.
  4. 4. Players 1. Software (operating system and apps): • Apple (iOS) • Google (Android) • Microsoft (Windows Phone) 2. Cellular service: • AT&T • Sprint • Verizon 3. Social: Facebook, Twitter, LinkedIn • Facebook • Twitter Slide 4 Copyright 2016Bryley Systems Inc.
  5. 5. Workplace 1. Blurring social-media lines*: • Social-advocacy programs in the office • Social messaging apps have 4B users • Social-media advertising – Look like posts and tweets targeted with precision – $24B • Social video – Facebook > YouTube 2. Bring your own device (BYOD): • Organization does not own the device • Outside of control and protection • Mixes organization data with personal data *Ryan Holmes, HootSuite CEO: 2016 Biggest Social Media Trends for Business Slide 5 Copyright 2016Bryley Systems Inc.
  6. 6. Workplace (continued) 3. Compliance: • Massachusetts 201 CMR 17 (2010) • HIPPA (1996) • Sarbanes Oxley (2002) 4. Employee state-of-mind: • Access from anywhere; anytime • Extends reach of corporate applications • Happier, productive employees or over- loaded and burnt out? Slide 6 Copyright 2016Bryley Systems Inc.
  7. 7. Threats 1. Most-common issues: • Poor user habits: Password, 2-factor, loss • Lack of encrypted transmission: BT+Wi-Fi • Out-of-date, unpatched OS and apps • Lack of malware protection • Unencrypted sensitive data 2. Example: Android Bankosy (2014)*: • Locks device and steals 2nd-factor passcode via call-forwarding • Matches passcode to user credentials * Android malware steals one-time passcodes Jeremy Kirk at CIO on 1/12/16 Slide 7 Copyright 2016Bryley Systems Inc.
  8. 8. Other risks 1. Applications: • Email – Confidential data not encrypted • File-sharing service – Unrestricted access 2. Accessories: • Credit-card readers – SSL encrypt while processing, no local storage, password • Remote control – Password & encrypted • Storage (SD cards) – Encrypted • Door locks – Password • Anti-theft keychains • Scanners Slide 8 Copyright 2016Bryley Systems Inc.
  9. 9. Security 1. Policies 2. Training 3. Enforcement See the Bryley Systems’ whitepaper: Protect your mobile device. Slide 9 Copyright 2016Bryley Systems Inc.
  10. 10. Security – Policies 1. Device: • Anti-malware and updates/patches • Encrypt data • Backups 2. User: • Complex passwords with auto-lock • Browser high-security mode 3. Remote access: • Encrypted transmission • Provide virtualized access • Do not store data locally Slide 10 Copyright 2016Bryley Systems Inc.
  11. 11. Security – Training 1. Authentication and encryption: • Password and biometrics • Require two-factor • Encrypt data 2. Reduce risk of loss or theft: • Vigilance • Phone-tracking apps • Physical-locking device 3. Safely deploy new applications: • Specific guidelines • Enforcement mechanism Slide 11 Copyright 2016Bryley Systems Inc.
  12. 12. Security – Training (continued) 4. Securely backup data • Scheduled and verified • Restrict online • Tethering 5. Wi-Fi connection: • Encrypt wireless transmission • Man-in-the-Middle Attacks (MITM) • Use Bluetooth cautiously in public 6. Dispose of properly: • Remove all data • Wipe internal storage Slide 12 Copyright 2016Bryley Systems Inc.
  13. 13. Security – Enforcement 1. Mobile Device Management (MDM): • Central administration aided by software • Deploy, secure, integrate, monitor, and manage all mobile devices • Enforce user-security policy • Recover lost/stolen devices • Control mobile-device applications • Airwatch, MobileIron, Kaseya, Exchange 2. Virtual Private Network (VPN): • Point-to-point encrypted tunnel • VPN appliance validates device Slide 13 Copyright 2016Bryley Systems Inc.
  14. 14. 3. Encryption: • Requires authentication to unencrypt • Add to device, folders, transmissions 4. Anti-malware: • Avast – 9/10; $15/year • AVG – 7/10; $15/year • BitDefender – 8/10; $15/year • Malwarebytes – Free 5. Backup: • Content creation: Tablets and notebooks • Access files via VPN or Cloud Slide 14 Copyright 2016Bryley Systems Inc. Security – Enforcement (continued)
  15. 15. Security – Enforcement (continued) 6. First steps: • Backup where needed • Deploy anti-malware app • Enable on-board encryption • Require password with auto-lock • Enforce two-factor authentication • Update through managed patching • Require VPN access to organization data Slide 15 Copyright 2016Bryley Systems Inc.
  16. 16. Mobility in Business Gavin Livingstone Bryley Systems Inc. GLivingstone@Bryley.com Manage • Optimize • Secure™ – Since 1987

×