SlideShare a Scribd company logo
#peterhewer
peterhewer.biz
Although Wi-Fi itself is fine, especially if
it a secure private network. Users will
mistakenly connect to public Wi-Fi
without considering the risk.
Sometimes, a public Wi-Fi network might
seem reputable, but really it was set up
for the intent of luring users into the
network
App leaks on a mobile device expose
sensitive information when an app
developer or web programmer fails to
use HTTPS to securely communicate over
the network. This can happen with a man-
in-the-middle attack.
A robust mobile policy must restrict employees
from accessing enterprise data through public
Wi-Fi. 
Use solutions that enable you to stop the processing
of data in apps that lead to data leakage. Restrict
permission for apps or certain files in order to limit
data leakage.
FRAUDULENT WI-FI HOTSPOTS
MOBILE & PERSONAL APPS
A data leak involves the unauthorised or unintentional
transfer of sensitive information from an enterprise mobile
device to an internet service. If an app or web developer fails
to properly protect data, they are essentially making data –
including sensitive company data - available to anyone who
utilises the same network as the device.
MOBILE DATA LEAKS -
IS THE BIGGEST THREAT
TO MOBILE SECURITY
IN 2019
Employee negligence such as accidental
loss is the main cause of data breaches.
Another top reason is when employees
email sensitive data to a recipient
outside of the organization, or
transferring enterprise data to a public
cloud instead of a private cloud.
When we think about enterprise mobility security, we tend to think of
the worst that can happen and what we need to protect ourselves. The
truth of the matter is that direct malware and hacking attacks on
mobile devices rarely occur. Mobile operating systems are more
secure, and after each upgrade, security is enhanced to prevent these
unsolicited attacks compared to attacks directly on your company
network.
Sources:
https://peterhewer.biz/enterprise-mobility-simple-security-threats/
https://peterhewer.biz/enterprise-mobility-book/
EMPLOYEE NEGLIGENCE
3 COMMON AREAS FOR DATA LEAKS
It’s critical to formalise security rules and
regulations in a mobile policy. Use MDM to allow
and restict access.

More Related Content

What's hot

Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
Shawn Crimson
 
Cyber Threats
Cyber ThreatsCyber Threats
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
Seqrite
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
Seqrite
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
Murray Security Services
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
Carol Meng-Shih Wang
 
Data breach
Data breachData breach
Data breach
Burhan Ahmed
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and Stash
Seclore
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
Samvel Gevorgyan
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
redteamacademypromo
 
Cloud computing's notorious nine-
Cloud computing's  notorious nine-Cloud computing's  notorious nine-
Cloud computing's notorious nine-Nikki Alexander
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
Mark Gibson
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
Sania Baker
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
Mastel Indonesia
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
Seclore
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
Seqrite
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
IBM Security
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
Carol Montgomery Adams
 

What's hot (20)

Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Data breach
Data breachData breach
Data breach
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and Stash
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Cloud computing's notorious nine-
Cloud computing's  notorious nine-Cloud computing's  notorious nine-
Cloud computing's notorious nine-
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 

Similar to 3 data leak possibilities that are easy to overlook

CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
kostikjaylonshaewe47
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
Turing.com
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environmentIBM Software India
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
UthsoNandy
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
IRJET Journal
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
IJERA Editor
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
arms8586
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
Icomm Technologies
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
GaytriDhingra1
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
Icomm Technologies
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
SHOLOVE INTERNATIONAL LLC
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
Kavita Rastogi
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
Gary Sandoval
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
InfinityGroup5
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
1SI19IS064TEJASS
 
Securing mobile devices 1
Securing mobile devices 1Securing mobile devices 1
Securing mobile devices 1
Kamaljeet Singh Matharu (Kam)
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
Seqrite
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
GFI Software
 

Similar to 3 data leak possibilities that are easy to overlook (20)

CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
880 st011
880 st011880 st011
880 st011
 
Securing mobile devices 1
Securing mobile devices 1Securing mobile devices 1
Securing mobile devices 1
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 

More from Peter Hewer

5 tips for digital transformation success
5 tips for digital transformation success5 tips for digital transformation success
5 tips for digital transformation success
Peter Hewer
 
How enterprise mobility improves productivty
How enterprise mobility improves productivtyHow enterprise mobility improves productivty
How enterprise mobility improves productivty
Peter Hewer
 
Changing operating system guidelines
Changing operating system guidelinesChanging operating system guidelines
Changing operating system guidelines
Peter Hewer
 
7 tips for a successful apps
7 tips for a successful apps7 tips for a successful apps
7 tips for a successful apps
Peter Hewer
 
Advantages of voice search in mobile apps
Advantages of voice search in mobile appsAdvantages of voice search in mobile apps
Advantages of voice search in mobile apps
Peter Hewer
 
9 basic MDM settings to get you started
9 basic MDM settings to get you started9 basic MDM settings to get you started
9 basic MDM settings to get you started
Peter Hewer
 
Enterprise Mobility trends for 2019
Enterprise Mobility trends for 2019Enterprise Mobility trends for 2019
Enterprise Mobility trends for 2019
Peter Hewer
 
Reimagine Enterprise Mobility with 5g
Reimagine Enterprise Mobility with 5gReimagine Enterprise Mobility with 5g
Reimagine Enterprise Mobility with 5g
Peter Hewer
 
Enterprise mobility enablement
Enterprise mobility enablementEnterprise mobility enablement
Enterprise mobility enablement
Peter Hewer
 
Essential MDM configurations
Essential MDM configurationsEssential MDM configurations
Essential MDM configurations
Peter Hewer
 
BYOD & company owned comparison
BYOD & company owned comparisonBYOD & company owned comparison
BYOD & company owned comparison
Peter Hewer
 

More from Peter Hewer (11)

5 tips for digital transformation success
5 tips for digital transformation success5 tips for digital transformation success
5 tips for digital transformation success
 
How enterprise mobility improves productivty
How enterprise mobility improves productivtyHow enterprise mobility improves productivty
How enterprise mobility improves productivty
 
Changing operating system guidelines
Changing operating system guidelinesChanging operating system guidelines
Changing operating system guidelines
 
7 tips for a successful apps
7 tips for a successful apps7 tips for a successful apps
7 tips for a successful apps
 
Advantages of voice search in mobile apps
Advantages of voice search in mobile appsAdvantages of voice search in mobile apps
Advantages of voice search in mobile apps
 
9 basic MDM settings to get you started
9 basic MDM settings to get you started9 basic MDM settings to get you started
9 basic MDM settings to get you started
 
Enterprise Mobility trends for 2019
Enterprise Mobility trends for 2019Enterprise Mobility trends for 2019
Enterprise Mobility trends for 2019
 
Reimagine Enterprise Mobility with 5g
Reimagine Enterprise Mobility with 5gReimagine Enterprise Mobility with 5g
Reimagine Enterprise Mobility with 5g
 
Enterprise mobility enablement
Enterprise mobility enablementEnterprise mobility enablement
Enterprise mobility enablement
 
Essential MDM configurations
Essential MDM configurationsEssential MDM configurations
Essential MDM configurations
 
BYOD & company owned comparison
BYOD & company owned comparisonBYOD & company owned comparison
BYOD & company owned comparison
 

3 data leak possibilities that are easy to overlook

  • 1. #peterhewer peterhewer.biz Although Wi-Fi itself is fine, especially if it a secure private network. Users will mistakenly connect to public Wi-Fi without considering the risk. Sometimes, a public Wi-Fi network might seem reputable, but really it was set up for the intent of luring users into the network App leaks on a mobile device expose sensitive information when an app developer or web programmer fails to use HTTPS to securely communicate over the network. This can happen with a man- in-the-middle attack. A robust mobile policy must restrict employees from accessing enterprise data through public Wi-Fi.  Use solutions that enable you to stop the processing of data in apps that lead to data leakage. Restrict permission for apps or certain files in order to limit data leakage. FRAUDULENT WI-FI HOTSPOTS MOBILE & PERSONAL APPS A data leak involves the unauthorised or unintentional transfer of sensitive information from an enterprise mobile device to an internet service. If an app or web developer fails to properly protect data, they are essentially making data – including sensitive company data - available to anyone who utilises the same network as the device. MOBILE DATA LEAKS - IS THE BIGGEST THREAT TO MOBILE SECURITY IN 2019 Employee negligence such as accidental loss is the main cause of data breaches. Another top reason is when employees email sensitive data to a recipient outside of the organization, or transferring enterprise data to a public cloud instead of a private cloud. When we think about enterprise mobility security, we tend to think of the worst that can happen and what we need to protect ourselves. The truth of the matter is that direct malware and hacking attacks on mobile devices rarely occur. Mobile operating systems are more secure, and after each upgrade, security is enhanced to prevent these unsolicited attacks compared to attacks directly on your company network. Sources: https://peterhewer.biz/enterprise-mobility-simple-security-threats/ https://peterhewer.biz/enterprise-mobility-book/ EMPLOYEE NEGLIGENCE 3 COMMON AREAS FOR DATA LEAKS It’s critical to formalise security rules and regulations in a mobile policy. Use MDM to allow and restict access.