Mobile Device Management - Bring Your Own Device

621 views

Published on

Using the help of Cristiano Ronaldo, This slideshow aims to explains the 5 key risks associated with bringing your own device (BYOD) to the workplace, and Mobile Device Management.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
621
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Mobile Device Management - Bring Your Own Device

  1. 1. MOBILEDEVICES in theWORKPLACE: ur ity S ec K ey ks: 5 R is
  2. 2. meetCRISTIANO
  3. 3. CRISTIANO is a business man
  4. 4. …and a trivia man
  5. 5. C r i st ia n o ,Hey U KN OW…DI D YO
  6. 6. …in 2011, Dubliners leftthousands of personalitems in taxis such as …
  7. 7. as et o fF AL SE TE ET H
  8. 8. GS DO otw
  9. 9. C ATo ne
  10. 10. a few TOILET SEATS
  11. 11. SH ES a lA un erf
  12. 12. an d aB AB Y
  13. 13. I al mostOh ! Andforgo t. . .
  14. 14. 25,000E PHONESMOBIL
  15. 15. And that’s just in DUBLIN
  16. 16. Many of those lost devices can store:10K 20K 200K 500KPHOTOS WORD DOCS EMAILS CONTACTS
  17. 17. That’s a lot ofSENSITIVE INFO!
  18. 18. Cristiano, Imag ineif YOUR PHON E landed in the wrong hands?
  19. 19. Just think about how much CORPORATE D A TA would be at risk ?
  20. 20. CRISTIANO’SConfidentialClient Info..
  21. 21. And p hysicais just l acce one ty ssSE C U pe of R I TY TH R E AT!
  22. 22. Wait, thereare more?
  23. 23. Sadly, YES. In fact there 5 K EY S E CU are RITY RISKS everyone mu st know.
  24. 24. CommunicationInterception
  25. 25. LookFamiliar?
  26. 26. Think back, wh en was thelast time you a ccessed a Wi-Fi hot spot ?
  27. 27. Hmm, where was I?
  28. 28. For companies with employees who use Wi-Fi hotspots … the stakes are high!
  29. 29. Malicious Code
  30. 30. Malware attacks ano longe re r confine d to PCs!
  31. 31. In fact,malwa mobile re thre on the a t s ar e rise…
  32. 32. ..and continue to affect the most prevalent mobile operating systems
  33. 33. Here ’s an fact f inter or yo estinin 201 u Cr i g 1… stiano ,
  34. 34. Before
  35. 35. After
  36. 36. w that’sWo ng!shocki
  37. 37. DeviceAttacks
  38. 38. Device atta cks aretypically de signed to g control of th a in e device an access cont d ent…
  39. 39. …or attempta denial ofservice(DOS).
  40. 40. DEVICE ATTACKSare similar to PCATTACKS of thepast, such as…
  41. 41. Browser-based attacks Buffer overflow expectationsApplication-basedattacks
  42. 42. l ca si s y sPh c e Ac
  43. 43. Cristiano, ar en’t Mobile Devices the perfect travel compa nion?
  44. 44. I mean they are…
  45. 45. small
  46. 46. portable
  47. 47. and lightweight.
  48. 48. But that also means, they are… 1. Easy to steal. 2. Leave behind.
  49. 49. and rem emberOh , th is slide?
  50. 50. 25 ,000 S MO BILE PHONE inleft in t axis in Dubl alone!
  51. 51. ew hatAh, I se re. did they ou er d og.Y ou clev
  52. 52. Insider Threats
  53. 53. Threa t s c an from also c withi ome organ n you isatio r n.
  54. 54. Malicious insiders can use mobile devices toleak important data.
  55. 55. Sharing corporateinformation from a smartphone will..
  56. 56. ..often circumvent robust monitoring systems, like Data Loss Prevention.
  57. 57. al ly? Re y? rio uslSe
  58. 58. no, REALLY!Yes Cr istia
  59. 59. Lets revie w t he 5 Key S e cu r ity Risks one more time.
  60. 60. Whether or not your company has formall yadopted mobile devi ces…
  61. 61. They are in yourenterprise.
  62. 62. So what should YOU do?
  63. 63. Voice Engineer Ireland 1 244 9590 Phon e: 0 n@v ei.ie l: nla nigaEmai land : @V EI r e Tweet
  64. 64. Sounds good to m e .

×