There’s a lot more to mobile security than enabling the password on your iPhone or iPad.
Unfortunately, very few small law firms have the proper measures in place to protect their confidential client data. If needed, could you convince a Board of Ethics that you had done your due diligence to protect your client’s data?
Strong iOS security starts with becoming familiar with the most common threats to compromising firm data on your iPhone or iPad. While many assume they are not at risk since they are not a ‘big’ law firm, the opposite is true.
Locking Down Risks from Unlocking
How organizations can protect themselves from the security threats and liability of unlocked phones. While steep fines have placed the unlocking issue in the spotlight, savvy organizations will tell you that this is nothing new. For years, they have taken action to protect themselves from the security risks posed by unlocked or jailbroken phones.
The question now is –how far should they go in ensuring that their employees don’t jailbreak or unlock their phones?
Webinar covers:
• Security strategy best practices
• Acceptable use policy options
• Data protection
• Application management
Mobile Security for Smartphones and TabletsVince Verbeke
Are security concerns for mobile devices, like smartphones and tablets, real? Or, are claims of exponential growth in malware simply FUD? We will explore the major mobile operating systems and security concerns with each. This session will provide tips that can be shared to help your users protect their personal info and data when viewed from a mobile device. Information on mobile security programs will be shared, as well, including a look at whether free or commercial offerings provide better protection.
As mobile devices become more commonplace, communication and information sharing will increasingly be done via an iPhone, tablet, or potentially eyewear.
How will this change the legal industry and client and practice management?
Learn more from Jeff Richardson, the blogger behind iPhone J.D. and Joshua Lenon, Clio’s Director of Communications, as they discuss how lawyers are using their mobile devices and apps when practicing law.
This webinar will cover:
- Best practices for securing your mobile device
- What legal activities are best suited for mobile practice
- A review of apps that lawyers are using today
2012 State of Mobile Survey Global Key FindingsSymantec
Symantec’s 2012 State of Mobility Survey revealed a global tipping point in mobility adoption. The survey highlighted an uptake in mobile applications across organizations with 71 percent of enterprises at least discussing deploying custom mobile applications and one-third currently implementing or have already implemented custom mobile applications.
Symantec Mobile Security Whitepaper June 2011Symantec
Symantec Corp. announced the publication of "A Window Into Mobile Device Security: Examining the security approaches employed in Apple’s iOS and Google’s Android." This whitepaper conducts an in-depth, technical evaluation of the two predominant mobile platforms, Apple’s iOS and Google’s Android, in an effort to help corporations understand the security risks of deploying these devices in the enterprise.
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
The modern organization has recognized the need to embrace mobile devices in the workplace, but this increase in mobile devices brings important security implications.
Locking Down Risks from Unlocking
How organizations can protect themselves from the security threats and liability of unlocked phones. While steep fines have placed the unlocking issue in the spotlight, savvy organizations will tell you that this is nothing new. For years, they have taken action to protect themselves from the security risks posed by unlocked or jailbroken phones.
The question now is –how far should they go in ensuring that their employees don’t jailbreak or unlock their phones?
Webinar covers:
• Security strategy best practices
• Acceptable use policy options
• Data protection
• Application management
Mobile Security for Smartphones and TabletsVince Verbeke
Are security concerns for mobile devices, like smartphones and tablets, real? Or, are claims of exponential growth in malware simply FUD? We will explore the major mobile operating systems and security concerns with each. This session will provide tips that can be shared to help your users protect their personal info and data when viewed from a mobile device. Information on mobile security programs will be shared, as well, including a look at whether free or commercial offerings provide better protection.
As mobile devices become more commonplace, communication and information sharing will increasingly be done via an iPhone, tablet, or potentially eyewear.
How will this change the legal industry and client and practice management?
Learn more from Jeff Richardson, the blogger behind iPhone J.D. and Joshua Lenon, Clio’s Director of Communications, as they discuss how lawyers are using their mobile devices and apps when practicing law.
This webinar will cover:
- Best practices for securing your mobile device
- What legal activities are best suited for mobile practice
- A review of apps that lawyers are using today
2012 State of Mobile Survey Global Key FindingsSymantec
Symantec’s 2012 State of Mobility Survey revealed a global tipping point in mobility adoption. The survey highlighted an uptake in mobile applications across organizations with 71 percent of enterprises at least discussing deploying custom mobile applications and one-third currently implementing or have already implemented custom mobile applications.
Symantec Mobile Security Whitepaper June 2011Symantec
Symantec Corp. announced the publication of "A Window Into Mobile Device Security: Examining the security approaches employed in Apple’s iOS and Google’s Android." This whitepaper conducts an in-depth, technical evaluation of the two predominant mobile platforms, Apple’s iOS and Google’s Android, in an effort to help corporations understand the security risks of deploying these devices in the enterprise.
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
The modern organization has recognized the need to embrace mobile devices in the workplace, but this increase in mobile devices brings important security implications.
Top 2016 Mobile Security Threats and your EmployeesNeil Kemp
The proliferation of mobile technology brings a potential increase of security threats. As Businesses become more mobile we teardown physical servers and trade them in for virtual space on the cloud. we are opening ourselves up to risk.
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
81% of companies have employee owned devices accessing their networks, but only 48% claim to have a well-defined mobile security strategy. To secure today’s mobile workforce businesses must consider adopting a framework to enable the use of mobile technology while minimizing the risks to both their employees and their customers. In this presentation, we review the unique challenges we all face and IBM’s approach to securing and managing the mobile enterprise.
http://securityintelligence.com/events/live-from-impact-2014-ibm-mobile-security-a-comprehensive-approach-to-securing-and-managing-the-mobile-enterprise/#.VMvT2vMo6Mo
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceNowSecure
How do you balance UX and security for mobile banking apps? Check out the slides originally presented on May 2 sharing FFIEC guidance and a study of vulnerabilities 30 mobile banking apps (15 iOS and 15 Android) from 15 financial institutions.
In a world ever more connected to the internet, Security should be paramount. However, to keep pace with the new trends and technologies, companies and individuals, overlook the importance of security and the risks this poses.
In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe.
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
BlackBerry and Google have worked together to enhance and simplify secure mobile productivity. The collaboration brings the leader in mobile security together with the world’s most popular mobility platform.
With enterprises rapidly embracing the Android platform to transform their workflows and processes through mobile innovation, Google has made a number of significant improvements in Android-specific security. These enhancements add to Google-provided security services, which are continuously updated to address both new and ongoing threats.
While security at the application and operating system level is critical, enterprises can go further by choosing the right mobility management platform. Building on Google’s security enhancements, BlackBerry Secure EMM Suites deliver the best Android security, productivity, and flexibility, to meet all enterprise use cases.
The complementary solutions delivered by BlackBerry and Google accelerate change while ensuring compliance with corporate security guidelines. This paper describes how these developments work together to keep enterprise Android users productive and protected.
The amount of data collected by mobile devices and apps is shocking, and vulnerable mobile apps expose that data to compromise. In our static and dynamic analysis of hundreds-of-thousands of mobile apps, we found that 25 percent of them harbor at least one high-risk vulnerability such as collecting/transmitting location data, credentials, and more in cleartext. Mobile data may only be as secure as the weakest app on someone’s device. Mobile app developers need to protect the users of their apps by building high quality, secure apps. This presentation covers the most common mobile app vulnerabilities (including a real-world demonstration), how to identify those vulnerabilities, and what to do to remediate them.
Slides from NowSecure Senior Solutions Engineer Jon Porter's talk at the OWASP Denver Chapter's July 2017 meeting.
Top 2016 Mobile Security Threats and your EmployeesNeil Kemp
The proliferation of mobile technology brings a potential increase of security threats. As Businesses become more mobile we teardown physical servers and trade them in for virtual space on the cloud. we are opening ourselves up to risk.
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
81% of companies have employee owned devices accessing their networks, but only 48% claim to have a well-defined mobile security strategy. To secure today’s mobile workforce businesses must consider adopting a framework to enable the use of mobile technology while minimizing the risks to both their employees and their customers. In this presentation, we review the unique challenges we all face and IBM’s approach to securing and managing the mobile enterprise.
http://securityintelligence.com/events/live-from-impact-2014-ibm-mobile-security-a-comprehensive-approach-to-securing-and-managing-the-mobile-enterprise/#.VMvT2vMo6Mo
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceNowSecure
How do you balance UX and security for mobile banking apps? Check out the slides originally presented on May 2 sharing FFIEC guidance and a study of vulnerabilities 30 mobile banking apps (15 iOS and 15 Android) from 15 financial institutions.
In a world ever more connected to the internet, Security should be paramount. However, to keep pace with the new trends and technologies, companies and individuals, overlook the importance of security and the risks this poses.
In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe.
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
BlackBerry and Google have worked together to enhance and simplify secure mobile productivity. The collaboration brings the leader in mobile security together with the world’s most popular mobility platform.
With enterprises rapidly embracing the Android platform to transform their workflows and processes through mobile innovation, Google has made a number of significant improvements in Android-specific security. These enhancements add to Google-provided security services, which are continuously updated to address both new and ongoing threats.
While security at the application and operating system level is critical, enterprises can go further by choosing the right mobility management platform. Building on Google’s security enhancements, BlackBerry Secure EMM Suites deliver the best Android security, productivity, and flexibility, to meet all enterprise use cases.
The complementary solutions delivered by BlackBerry and Google accelerate change while ensuring compliance with corporate security guidelines. This paper describes how these developments work together to keep enterprise Android users productive and protected.
The amount of data collected by mobile devices and apps is shocking, and vulnerable mobile apps expose that data to compromise. In our static and dynamic analysis of hundreds-of-thousands of mobile apps, we found that 25 percent of them harbor at least one high-risk vulnerability such as collecting/transmitting location data, credentials, and more in cleartext. Mobile data may only be as secure as the weakest app on someone’s device. Mobile app developers need to protect the users of their apps by building high quality, secure apps. This presentation covers the most common mobile app vulnerabilities (including a real-world demonstration), how to identify those vulnerabilities, and what to do to remediate them.
Slides from NowSecure Senior Solutions Engineer Jon Porter's talk at the OWASP Denver Chapter's July 2017 meeting.
You already know BYOD is here to stay. How can you give employees the flexibility they demand? Prevent BYOD from becoming BYOT (threat)? Ensure a uniform trust model for device provisioning? Mitigate the risks for applications, network access and data security?
This webinar provides a policy framework for BYOD enablement:
• Risk and vulnerability assessment
• Security and access policies
• Key success factors
• Trigger response policies
• Prevent data loss at both the application and device level
• Shared device security policies
• Options for achieving your security requirements and end-user expectations
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
Companies are increasingly encouraging employees to purchase their own devices such as smartphones, tablets and laptops to use at work according to a recent survey by CIO magazine. The acronyms BYOC and BYOD (like Bring Your Own Beer - Bring Your Own Computer/Device) have become mainstream technology terms. But what does BYOD mean for the enterprise? Can we mix personally owned devices and enterprise workstations/cellphones in our environment? How do we control configuration and data on personal devices? What about malware and other security concerns? What about improper disclosure of private data and intellectual property? And how will staff get work done when they are busy playing Angry Birds?
Is BYOD the flavor of the week or is the future of end-user hardware? Regardless of how security leaders may feel about the concept, we need to be prepared. We must understand what is driving BYOD, how it may, or may not, fit our environments, and have policy and tools ready.
In this interactive session we will discuss: What is IT Consumerization/BYOD? What are the benefits and concerns? Is there a cost savings? What are the Security concerns - BYOMalware? How do we protect data? And how can I start BYOD in my organization?
And yes, you can Bring Your Own Devices to this session!
Secure360 05-13-2013.
More and more organization employees are required to work outside the office using tablets, laptops and smartphones. These technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Mobile technologies collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company. This webinar will discuss the risks faced by small to medium size organizations that require employees to work remotely. We will also discuss mitigation strategies.
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
Our security practices need to evolve in order to address the new challenges propped up by the rapid adoption of technologies and products to enable the world to WFH. The mantra of the attacker remains consistent -- attack that which yields maximum result -- and that is usually something used by a very very large number of users. This webinar will discuss the Top 10 Security Gaps that CISOs should be aware of as they brace for long WFH periods.
What will you learn :
-New Attack techniques hackers are using targeting WFH
-How to handle decentralisation of IT and technology decisions?
-Application risks as enterprises pivot to online/new business model(s)
-New risks in the Cloud and due to Shadow IT
-Security risks due to uninformed employees & their home infrastructure
-How to handle Misconfigurations & Third party risks
-How to build a robust breach response and recovery program?
Full video - https://youtu.be/bQLfnmhDnQs
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
There are many (small) risks and threats which are frequently overlooked in an organization. The presentation takes a look at where Risks & Threats (RaT) come from and at the "Biggies" in the RaT Lists. We look at a few Frequently Overlooked Threats and Risks (FORT) and Course Correction Options and finally a few Case Studies to highlight FORTs
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
Are security concerns for mobile devices, like smartphones and tablets, real? Or, are claims of exponential growth in malware simply FUD? We will explore the major mobile operating systems and security concerns with each. This session will provide tips that can be shared to help your users protect their personal info and data when viewed from a mobile device. Information on mobile security programs will be shared, as well, including a look at whether free or commercial offerings provide better protection.
hva det betyr at alle tar kontrollen over egen IT-arena? Richard Hayton gir oss innsikt i hva konsekvensene er av at de ansatte definerer sin egen IT-arbeidsplass og hvordan fremtidens klientløsninger skal bygges for å ivareta både ansatte og bedriftens interesser.
How to Manage the Great BlackBerry MigrationTroy C. Fulton
BlackBerry might be forcing the migration issue for many organizations, but this is the new normal. The demands of users and the breakneck speed of IT consumerization driven by mobile, and now applications, have made that clear. Technically, this is not difficult. So what is the real issue? A deepening opportunity cost in innovation (lack of) that drives enterprise agility.
Tackle the key points of consideration and methodologies required for a successful platform migration both before and after implementation.
Similar to How to Secure Your iOs Device and Keep Client Data Safe (20)
When it comes to making more money, most law firms are overwhelmed. They don’t know how to start or what to prioritize, and another year rolls by without moving the needle.
Let’s make 2019 a year to remember by boosting revenues more than ever before. Rocket Matter has worked with thousands of law firms, and we’ve seen firsthand what works and what doesn’t. In this webinar, we’ll share our top tips to start increasing revenue right out of the gate in the new year.
Trying to figure out what laptops, smartphones, and technical goodies to purchase this holiday season? Whether you’re buying gifts for yourself or for others, our hip and savvy tech wizards at Rocket Matter will point you to this year’s can’t-miss technology products.
Law firms are late to the game when it comes to leveraging common business techniques—and that includes legal project management. In this webinar, we’ll remove all the fancy business jargon and explain legal project management in very simple terms. We’ll also demonstrate how you can manage a case with this powerful tool. Join us for an informative and entertaining webinar lead by Larry Port, CEO of Rocket Matter and co-author of the ABA’s #1 bestseller The Lean Law Firm.
Lawyers can’t afford to miss a beat—no matter what. Even when a hurricane or other natural disaster heads their way, attorneys need to keep providing service to their clients. And in this day and age, there’s no reason why they can’t! Cloud and internet technologies allow lawyers to access data and communicate from anywhere at any time. Also, a little disaster preparedness and business continuity planning can go a very long way in protecting yourself and your firm. In this CLE, you’ll learn all the basics you need to know. We hope it helps keep you and your law firm safe!
Every month law firms struggle with how to improve their cash flow, profitability, and overall financial health. They often don’t know if they’re billing accurately for their time or if they’re collecting less than they should. Many lawyers certainly experience delays in actually receiving the payments they’re owed.
The reality is that poor time-tracking, billing, and accounts receivable practices contribute to bottlenecks in getting paid. In this webinar, we’ll look at common billing mistakes, and then we’ll discuss the best practices that will help you bring in more money than ever before!
Increase Your Law Firm's Bottom Line with Fixed Cost ReducitonRocket Matter, LLC
Law firms are under constant pressure to simultaneously reduce costs and grow their firms. That might seem impossible at times, but there are tricks to balancing this savings/growth dichotomy. In this webinar, you’ll learn how to analyze your monthly expenses so that you can make adjustments to save your firm money while you increase your bottom line.
One of the most difficult things about being a lawyer is staying productive as much as possible. Well, we have some good news: There are a host of fantastic productivity tools out there that help you remain efficient and save time. Join us for this webinar as we share which of those tools are the best of the best.
It’s no secret that automation can help lawyers run a more efficient practice. In fact, 23% of a lawyer’s job can be automated with existing technology! Automation can also provide your firm a competitive advantage because it allows you to focus more on client service and boosting profits rather than repetitive tasks.
In this webinar, we’ll talk about common law firm tasks that could benefit from automation. We’ll also highlight the Rocket Matter features and existing technology that will help you accomplish this.
Title: How to Increase Profits and Sanity By Running a Lean Law Firm
Description:
Running a law firm can be tough. Clients are demanding, competition is fierce, and there aren't enough hours in the day to successfully juggle your priorities.
If you're running a law firm the way most people run their firms, odds are that you're using outdated techniques that will continue to doom you to an unprofitable, chaotic existence. There's a reason you're not escaping the madness, primarily because law firms have not embraced management techniques that are decades, and in some cases, over a century old.
The good news is that we can learn from companies like Toyota and Intel, some of the most forward-thinking business on the planet, and employ techniques from manufacturing companies. In this session, we will learn what it means to be a Lean law firm and employ systems-thinking to see your firm's business from a new perspective. You will depart our session not just with a theoretical understanding, but with practical tips you can employ immediately to improve your firm's financial position - as well as your happiness running your law firm.
The Secrets to a Happy, Successful Legal Career Part 2 of 2Rocket Matter, LLC
In this fun and engaging session, Larry Port from Rocket Matter explores the science of success and happiness. This two-hour session demonstrates, with both lecture and interactive activities, how lawyers serve clients better, lead more fulfilling lives, while building a more profitable and successful career. Mixing personal anecdotes and his extensive research from from his own quest to build a happy and successful life, Larry will assist attendees to formulate their own plans to translate the lessons of the session into actionable steps.
This is Part Two of Two, covering how the mind works and guides the participants through interactive activities.
Objectives:
* Introduce scientific research and findings related to contentedness.
* Identify the positive correlation between happiness and professional success.
* Teach and practice techniques to cultivate a positive mindset.
* Depart the session with a 21-day plan to build on lessons learned in this session.
Want your productivity, mobility, and overhead savings to skyrocket in 2018? Join us for our annual paperless law office webinar to help you achieve all of that and more. Our presenters are experts in moving firms to the cloud, so they can really help teach you all the latest tips and tricks on going paperless. (One of them is a paperless lawyer herself!) You’ll learn the most up-to-date practices, must-have tools, protocols, and workflows to start and maintain a successful paperless office.
Delivering the Ultimate Law Firm Client Service ExperienceRocket Matter, LLC
Exceptional client service is imperative for law firms that want to succeed and retain happy, loyal clients. What’s more, many customers might turn to sites such as Yelp, Avvo, Twitter, and Facebook to review you firm, and you need to do what you can to make sure those reviews are positive. (After all, negative reviews can really harm, if not destroy, a business.) In this webinar, we’ll help you solidify a plan and set procedures to increase the odds that every one of your clients has a positive experience—the kind that makes them want to rave about you to the world.
How Rocket Matter's Atlas Gold Edition Helps You Run a More Flexible FirmRocket Matter, LLC
Let’s face facts: Today’s lawyers are no longer tethered to a desk or working completely alone on projects or cases. The practice of law is becoming increasingly mobile and collaborative, which is why Rocket Matter’s latest product release makes it easier to become a savvier firm. Discover how you can run a more flexible practice, from anywhere, with Rocket Matter’s Atlas Gold edition.
How Lawyers Can Easily Offer Alternative Fee ArrangementsRocket Matter, LLC
Have you been wanting to implement alternative fee arrangements (AFAs) in your practice, but you just don’t know how? We get that it’s one thing to move away from the strict billable hour because a client requested that you do so, but it’s very different when you’re the one proposing it. However, doing so can be a win-win for both you and your client: Altman Weil’s latest Law Firms in Transition survey showed a “7-year trend of compelling success enjoyed by firms that take a proactive approach to alternative fee arrangements.” In other words, being proactive can help you make more money and make your clients very happy.
This webinar will help you figure out exactly how to start offering AFAs to your clients.
Capturing and Converting Phone Leads with Rocket Matter and RubyRocket Matter, LLC
With all the ways we have to communicate today, it may surprise you to learn that customers still prefer to use the phone to interact with businesses. In fact, companies of all sizes are seeing an explosion of inbound calls. Why? One big reason is click-to-call, which is the ability to dial a business directly from a mobile search. In fact, click-to-call is booming, and its popularity isn’t expected to fade any time soon: Experts predict that people will make around 162 billion calls to businesses from smartphones in 2019.
Rocket Matter and Ruby® Receptionists are teaming up for a webinar designed to help you capitalize on this inbound call renaissance and turn your phone into a productive marketing channel and money-maker. As a webinar attendee, you’ll:
Learn how to take advantage of click-to-call technology on both your website and Google listing.
Learn how to address the many needs of mobile callers and improve their experiences from start to finish.
Explore the new integration between Rocket Matter’s all-in-one legal practice management platform and Ruby’s live virtual receptionist service.
Learn how Rocket Matter and Ruby work together to help you streamline workflow, build trust with current and potential clients, grow your practice, and more.
Beyond the Billable Hour: How to Leverage AFAs to Build a Better PracticeRocket Matter, LLC
In this webinar, we introduce several possible Alternative Fee Arrangements to consider. We also show you how to draft the appropriate fee agreement to manage your client’s expectations.
Boost Revenues in 2017 with Automated Recurring Payments and WorkflowsRocket Matter, LLC
Discover how to boost your revenues significantly, collect money automatically, and save a lot of time with the latest additions to Rocket Matter Payments, the most powerful collection mechanism ever created for law firms. We’ll cover how to set up payment plans and recurring payments and how to email all of your bills at once.
Higher productivity, faster client response, improved mobility and access, savings from reduced storage space and printing costs, increased security of documents and files…The benefits of a paperless office are many. Yet surveys show that the legal profession is one of the most resistant to a paper-free or less-paper environment.
Converting your firm to a paperless operation is not as overwhelming or as complicated as you think. With the decline in paper usage along with rise in digital consumption and mobile devices, you’re already on your way without even trying. But you’ll need to formalize the processes.
Learn about essential tools, protocols, and workflows to start and maintain a paperless office. You will hear from one lawyer who took his firm paperless and the process the firm went through, and from another small-firm attorney, on best practices for naming and storing digital files so you can easily find and retrieve them. We’ll wrap up with must-have tools and applications for every paperless law office.
Are you running any antivirus and anti-malware software on your Macs?
What steps have you put into place to secure your firm’s data and protect your clients’ information?
If you’re like most Mac-based law firms, chances are you’re doing very little outside of just ‘using a Mac’ as your security strategy.
Here are eight security strategies you must implement ASAP to protect your firm.
3. Story 1:
Christine
Senior Paralegal
and Office Manager
Ditcher, Quick & Hyde,
Divorce Lawyers
4. Stats on passwords:
• Half of iPhone users don’t lock their phones (pre-TouchID).
• 10 most common passwords made up 15% of all phones*:
• 1234, 0000, 2580, 1111, 5555, 5683 (LOVE), 0852, 2222, 1212 and 1998.
• The top four codes represent 10.8
• Years between 1990 and 2000 are all in the top 50, and 1980 to 1989 are in the
top 100 passcodes
• With a 15 percent success rate, about 1 in 7 iPhones would easily unlock
http://www.eweek.com/c/a/Security/Top-10-PIN-Codes-Picked-by-iPhone-Users-637446/#sthash.ihFP9INR.dpuf
5. Story 1:
Christine
Senior Paralegal
and Office Manager
Ditcher, Quick & Hyde,
Divorce Lawyers
Lesson:
Trust cannot replace
implementing proper and
enforceable measures.
7. Stats on disgruntled employees:
• Corporate Executive Board survey that showed that 75% of people who leave
their jobs are disgruntled when they do so.
• There is high risk for lawsuits where private information is revealed:
• medical records, mental health treatment records, and drug and alcohol
treatment records.
• Even bigger problem in smaller firms, where we all know each other and trust
everyone. This can lead to complacency which can come back to bite you later
on, when least expected.
You have a duty to protect client confidences –
did you take all reasonable steps to do so?
Were your actions appropriate to the risk,
considering the capabilities of your firm’s data security?
8. Story 2:
“Johnny”
Project Manager
GlobalMac IT
Lesson:
Disgruntled Employees
Can Cause Chaos
9. Story 3:
“Saul Goodman”
Attorney
Saul Goodman
Attorney at Law
10. Stats on theft and stolen devices:
• More than 3 million handsets were stolen in 2013
• Theft has increased by 26% in Los Angeles since 2011, 23% in San Fransisco,
and 18% of all grand larcenies in New York City last year involved Apple
products.
http://www.businessinsider.com/smartphone-theft-statistics-2014-5#ixzz3GnMj29cM
11. Stats on the reporting of thefts:
• Only 50% of respondents reported a loss or theft within one day.
• 38% took between 1 and 2 days
• Nearly 10% took up to five days to notify their employer.
19% of the businesses surveyed reported an incident of a lost or stolen device, and
experienced some form of related data loss, meaning businesses have approximately
a one-in-five chance of losing data if a corporate mobile device is stolen.
*Kaspersky Lab survey of global IT security professionals, 9/2014.
12. Story 3:
“Saul Goodman”
Attorney
Saul Goodman
Attorney at Law
Lesson:
Theft happens and are often
not immediately reported.
13. Story 4:
“Johnny B. Goode”
Senior Partner
Screwem, Goode & Hart
Attorneys at Law
14. Stats on accidental damage:
• Theft is scary, but accidental damage is 10 times more common than loss or
theft
• A study by SquareTrade in 2012, showed that damaged iPhones have cost
Americans $5.9 billion since their introduction in 2007.
• The top five iPhone accident scenarios according to the study are:
• Phone dropped from my hand
• Phone fell into a toilet, sink, hot tub, swimming pool, lake, etc.
• Phone dropped from a lap
• Phone knocked off a table
• Phone drenched by some liquid
How quickly could you get back up and running
if your phone bit the dust?
15. Story 4:
“Johnny B. Goode”
Senior Partner
Screwem, Goode & Hart
Attorneys at Law
Lesson:
Sh*t happens.
16. If needed, could you convince
a Board of Ethics that you had
done your due diligence in
protecting your client’s
information?
17. Use a Mobile Device
Management
solution (MDM)
My Top 3 List:
#1
18. iCloud is NOT an MDM solution
• made for end users, not business
• cannot scale up
• enforces nothing
• once added onto your staff’s devices, they can:
• track where you are
• turn on your personal email, notes and photo
stream.
• access all your iCloud data.
• can also be easily disabled
19. Top 3 MDM Options
#1 - Built-in aka Homebrew solution:
Profile Manager in OS X Server
• OS X Server, but this is very technical and is a lot of work. Some of the things
you’ll need:
• Static IP, FQDN, SSL certificate, configured Server with proper DNS settings
and more.
• This is for the DIY person, who’s a techie at heart who also happens to be an
attorney and does not mind sinking hours into this project.
• iOS only, Windows and Android not supported.
Here is an excellent play-by-play manual for those who want to go this route:
http://krypted.com/mac-os-x/using-profile-manager-3-in-mavericks-server/
(email me - for the link if you’d like it)
20. Top 3 MDM Options
#2 - Free solution:
Meraki Systems Manager MDM
• Very robust solution, developed by Meraki, owned by Cisco.
• Cloud-based MDM package with which you can get up and running fairly
easily.
• Supported Mobile Devices: iOS, Android, Windows Phone
• Drawback:
• no support included with free version
• there is a new paid version ($40/device per year) with many additional
features.
https://meraki.cisco.com/products/systems-manager
21. Top 3 MDM Options
#3 - Paid solution:
MaaS360 by Fiberlink,
an IBM company
• Maas360 - owned by IBM, paid service ($5/device per month)
• All inclusive pricing. They never charge extra for set up, activation, or their
24x7x365 live support.
• Supports all platforms (iOS, Android, BlackBerry, WebOS, Windows
Mobile)
• No device minimums
22. Add company data
onto iOS devices
through profiles
My Top 3 List:
(using MDM solution)
#2
23. The problem with
adding info manually,
is that you have no control;
it CANNOT be removed remotely.
Changing the password
is NOT the same.
33. BYOD boils down to a well-drafted
and comprehensive policy
that spells out the rights for both
companies and employees.
Such a policy covers a company’s:
• right to monitor, access, review and disclose
company or other data on a mobile device
• the employee's expectations of privacy with
respect to that device.
*http://www.cio.com/article/2386235/byod/how-to-craft-the-best-byod-policy.html
34. What does a good BYOD
policy look like?
It goes through general rules about personal mobile
device usage:
• company's rights with respect to monitoring,
accessing and reviewing all the data on the device.
• employee's obligations with respect to keeping the
device secure, password requirements, all the things
you'd expect to see in a general IT policy.
• what happens if you're terminated or decide to leave
the company.
35. How to get
a policy in place?
• No two BYOD policies are or should be alike. Here
are 5 BYOD policy templates to help you start:
• 4 samples here, along with steps to implement:
http://tek.io/1uLWDsC
• Our MDM Toolkit with a BYOD template here:
globalmacit.com/milomdm