Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Ensuring Mobile Device Security


Published on

Your mobile device can become your biggest liability if it falls into the wrong hands. In this presentation, we help you understand:

a. Importance of securing your mobile device
b. Identifying the various types of threats to your mobile device security
c. How to secure your mobile device against such threats
d. How Quick Heal helps keep your mobile device secure

Published in: Software
  • Be the first to comment

Ensuring Mobile Device Security

  1. 1. Ensuring Mobile Device Security Quick HealTechnologies Private Limited
  2. 2. • App stores and mobile apps are the greatest hostile code and malware delivery mechanism ever created. — Winn Schwartau, chairman of • For most enterprises and consumers today, mobile and cloud security are viewed in a pretty straightforward way — don't assume there is any. — Russ Dietz,CTO of SafeNet Introduction
  3. 3. What do we do with mobile devices? Phone service and text messaging Personal email Scheduling appointments & reminders Accessing social websites Listening to music and watching videos Playing online games Online shopping, banking and bill paying Document & other data storage
  4. 4. Information stored in mobile devices Usernames Contacts Passwords Cookies Location data UDID/IMEI, Device name, Network connection name Personal information: DoB, address, social, credit card data, photographs etc. Application data Confidential and official documents Transaction history
  5. 5. Number Crunching..
  6. 6. Mobile device explosion There are officially more mobile devices than people in the world And they’re multiplying five times faster than we are December 2014 7.1 Billion People 7.7 Billion Mobile Devices 14.1 Lac Apps on Google Play 1.4+ million apps available 75+ billion apps downloaded
  7. 7. Do you agree? With the explosive growth of smartphones, tablets and other mobile devices, consumers must make security of the mobile devices a priority & find means for securing their mobile devices seamlessly and efficiently.
  8. 8. Risks associated with mobile devices Portable data storage Wireless connections 3rd party applications Data integrity Data availability
  9. 9. To ensure mobile device security Ensure the security of the mobile device  Ensure the security of mobile data  Ensure the security of mobile applications
  10. 10. ThreatsTo Mobile Devices Quick HealTechnologies Private Limited
  11. 11. Threats to mobile devices Mobile malware  Smartphones and tablets are susceptible to worms, viruses,Trojans and spyware similarly to desktops Mobile malware can steal sensitive data, rack up long distance phone charges and collect user data
  12. 12. Threats to mobile devices Eavesdropping Wireless networks have good link-level security but lack end-to-end upper-layer security Data sent from the device to the outside world is often unencrypted Intruders eavesdrop on user’s sensitive communications
  13. 13. Threats to mobile devices Unauthorized access Unauthorized access to mobile devices also means unauthorized access to emails, apps, social media profiles, multimedia files and more.
  14. 14. Threats to mobile devices Theft and loss Mobile devices are easily susceptible to loss or theft Leaving your phone in a taxi or getting your phone stolen during a bus commute Data stored in such devices is at risk The data could be corporate mails, passwords, bank statements & other crucial information
  15. 15. Threats to mobile devices Unlicensed and unmanaged applications Even popular apps have vulnerabilities that are open for exploits Needless to say, the security threats posed by unlicensed apps Whether apps are licensed or not, they must be updated regularly to fix vulnerabilities that could be exploited to gain unauthorized access or steal data
  16. 16. Threats to mobile devices Unlicensed and unmanaged applications Access to confidential data In-app ads get the same permissions Malicious and suspicious app activity System instability
  17. 17. Methods to handle mobile security Authentication  Encryption  Filtering
  18. 18. Authentication Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be User authentication is usually handled with username & password combinations, biometric identifications, PINs etc. Ultimate aim is to ensure device access to authentic users only
  19. 19. Authentication Mobile devices by default are not password enabled However, most of the devices have technical capability to support authentication - passwords, PINs, pattern screen locks, and biometric readers It is up to the users to ensure these are enabled
  20. 20. Encryption Encryption is the conversion of data into a form, called a ‘ciphertext’, that cannot be easily understood by unauthorized people In simple words, encryption is the method of converting plain text to encoded text which is unreadable by intruders
  21. 21. Encryption Encrypting mobile devices helps in securing data stored on a mobile device or transmitted from mobile devices Most mobile devices have data encryption capabilities Data encryption has little or no impact on the way users access the data
  22. 22. Encryption Encryption limits the ability of intruders to obtain readable and reckonable data from the mobile device Encryption also makes it difficult to generate important data for authentication
  23. 23. Filtering Filtering is the process of removing threats arising due to web access, email and apps Mobile devices by default do not have filtering capabilities Web pages & email attachments are often used as carriers of viruses and malware attacks Filtering can be done with the use of a mobile security software and it is not a default facility provided by mobile devices
  24. 24. Ensuring Mobile Device Security Quick HealTechnologies Private Limited
  25. 25. To prevent damage from theft or loss Set a PIN or password  Set to automatically lock screens Backup your contact info Install a security app Turn on encryption Turn on location settings Enable remote wipe if available Act immediately if lost - Report to the authorities Ervins Strauhmanis / Foter / CC BY
  26. 26. Review application permissions Take time to read the small print • What information does the app require access to?
  27. 27. Encrypt your phone Encrypt the device data to make it difficult for intruders to gain and understand sensitive information
  28. 28. Apps from unknown sources -Take a call Apps from unknown sources are necessary sometimes
  29. 29. Mobile Device Management (MDM) - For enterprises Mobile Device Management (MDM) apps allow enrollment of corporate devices over a seamless cloud-based solution for all mobile devices within the enterprise Once a device is connected to the corporate network, an authorized administrator can manage and control the mobile fleet MDM solutions secure, monitor and manage mobile devices within the enterprise It also blocks phishing and malicious websites and filters web access
  30. 30. How can Quick Heal help? Quick HealTechnologies Private Limited
  31. 31. How can Quick Heal help?
  32. 32. Quick Heal Khareedo Gaadi Jeeto Contest
  33. 33. Write to us at: Follow us on: Facebook - Twitter - G+ - YouTube - SlideShare - Visit us: Website - Official Blog -
  34. 34. ThankYou!
  35. 35. • security/?mode=featured • mobile-devices-than-people-in-the-world-9780518.html • References