Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Avoiding a BYOD Blowup!


Published on

There sure are a lot of smartphones and tablets the workplace these days! With the recent BYOD explosion, more and more devices have access to your company’s critical data. What is an IT pro to do to mitigate the threat posed by these devices? Learn how to protect your workforce, secure your network, and educate your users about threats.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Avoiding a BYOD Blowup!

  1. 1. Avoid a BYOD Blowup! Securing mobile devices Peter Tsai, Spiceworks IT Content Guru @supertsai
  2. 2. Presented by Spiceworks
  3. 3. Device BYOD = Bring Your Own • • • • Danger What are BYOD & Mobile Security? Why is mobile security Important? What are BYOD risks / threats? How the heck to guard against threats? • Security, an ongoing process
  4. 4. With Special Guest Joe Foran IT Director - Bridgeport, CT 20 years in IT A+, CCA, CNE, MCITP, MCP (XP), MCSE, Network+, Security+, Server+
  5. 5. What are BYOD & Mobile Security? Bring Your Own Device (BYOD) Policy of letting employees to bring their own mobile devices to work, and allowing those devices to access the company network. BYOB Mobile Devices include: laptops, tablets, and smart phones BYOD
  6. 6. How many Ds are there in BYOD? More than 1 billion people have a smartphone 1 in 3 American adults owns a tablet 500 million laptops are sold every year worldwide All of these devices can connect to networks through Wi-Fi (or a hard wire) OMG! SO MANY DEVICES!
  7. 7. Why is Mobile Security Important? A weak BYOD policy could result in ◦ Exposed data ◦ Theft of sensitive information ◦ Devices infected with viruses ◦ Websites or accounts hijacked ◦ Data corruption ◦ System downtime ◦ Financial Loss / Damage to brand ◦ Compliance penalties ◦ Bandwidth constraints BYOD DOG HACKING YOUR INTERNETS
  8. 8. What are Examples of Security FAILs? Data Breaches / Data Theft o Target o Neiman Marcus o JC Penney o 7-Eleven o Dow Jones servers o US Military o Iran nuclear centrifuges o Social Security numbers at data brokers o My Facebook
  9. 9. What are Examples of Security FAILs? NSFW NSFW NSFW
  10. 10. What are MDM and MAM? MDM (Mobile Device Management) Software that IT can use to monitor, inventory, manage, lock down, control, encrypt, track, wipe, and enforce policies on mobile devices MAM (Mobile Application Management) Like MDM, but MAM can lock down specific apps on a device instead of the entire device. MAM also helps limit the sharing of corporate data among apps.
  11. 11. What are BYOD security measures? Layered Approach to Security Authenticate Protect Educate Secure NETWORK SECURED!
  12. 12. What are BYOD security measures? Authenticate ◦ Password protect devices ◦ Restrict access to networks ◦ Disallow anonymous access ◦ Consider a separate guest network Protect ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ Encrypt data Limit external access Antivirus / Antimalware Patch management Firewalls Application control Network monitoring No “jailbreaking” Desktop virtualization
  13. 13. What are BYOD security measures? Educate ◦ People can be your weakest link ◦ Social engineering can target specific people ◦ Some are unaware of threats and the need for a BYOD policy ◦ New threats are always emerging Secure ◦ Secure physical systems ◦ Wipe devices if they go missing ◦ Physical security policies to minimize risk ◦ Perform regular security audits
  14. 14. Security is an ongoing process!
  15. 15. Where can I learn more about BYOD?