SlideShare a Scribd company logo
How to Secure 
Your iOS Device & 
Keep Client Data Safe 
Tom Lambotte
Less is more.
Story 1: 
Christine 
Senior Paralegal 
and Office Manager 
Ditcher, Quick & Hyde, 
Divorce Lawyers
Stats on passwords: 
• Half of iPhone users don’t lock their phones (pre-TouchID). 
• 10 most common passwords made up 15% of all phones*: 
• 1234, 0000, 2580, 1111, 5555, 5683 (LOVE), 0852, 2222, 1212 and 1998. 
• The top four codes represent 10.8 
• Years between 1990 and 2000 are all in the top 50, and 1980 to 1989 are in the 
top 100 passcodes 
• With a 15 percent success rate, about 1 in 7 iPhones would easily unlock 
http://www.eweek.com/c/a/Security/Top-10-PIN-Codes-Picked-by-iPhone-Users-637446/#sthash.ihFP9INR.dpuf
Story 1: 
Christine 
Senior Paralegal 
and Office Manager 
Ditcher, Quick & Hyde, 
Divorce Lawyers 
Lesson: 
Trust cannot replace 
implementing proper and 
enforceable measures.
Story 2: 
“Johnny” 
Project Manager 
GlobalMac IT
Stats on disgruntled employees: 
• Corporate Executive Board survey that showed that 75% of people who leave 
their jobs are disgruntled when they do so. 
• There is high risk for lawsuits where private information is revealed: 
• medical records, mental health treatment records, and drug and alcohol 
treatment records. 
• Even bigger problem in smaller firms, where we all know each other and trust 
everyone. This can lead to complacency which can come back to bite you later 
on, when least expected. 
You have a duty to protect client confidences – 
did you take all reasonable steps to do so? 
Were your actions appropriate to the risk, 
considering the capabilities of your firm’s data security?
Story 2: 
“Johnny” 
Project Manager 
GlobalMac IT 
Lesson: 
Disgruntled Employees 
Can Cause Chaos
Story 3: 
“Saul Goodman” 
Attorney 
Saul Goodman 
Attorney at Law
Stats on theft and stolen devices: 
• More than 3 million handsets were stolen in 2013 
• Theft has increased by 26% in Los Angeles since 2011, 23% in San Fransisco, 
and 18% of all grand larcenies in New York City last year involved Apple 
products. 
http://www.businessinsider.com/smartphone-theft-statistics-2014-5#ixzz3GnMj29cM
Stats on the reporting of thefts: 
• Only 50% of respondents reported a loss or theft within one day. 
• 38% took between 1 and 2 days 
• Nearly 10% took up to five days to notify their employer. 
19% of the businesses surveyed reported an incident of a lost or stolen device, and 
experienced some form of related data loss, meaning businesses have approximately 
a one-in-five chance of losing data if a corporate mobile device is stolen. 
*Kaspersky Lab survey of global IT security professionals, 9/2014.
Story 3: 
“Saul Goodman” 
Attorney 
Saul Goodman 
Attorney at Law 
Lesson: 
Theft happens and are often 
not immediately reported.
Story 4: 
“Johnny B. Goode” 
Senior Partner 
Screwem, Goode & Hart 
Attorneys at Law
Stats on accidental damage: 
• Theft is scary, but accidental damage is 10 times more common than loss or 
theft 
• A study by SquareTrade in 2012, showed that damaged iPhones have cost 
Americans $5.9 billion since their introduction in 2007. 
• The top five iPhone accident scenarios according to the study are: 
• Phone dropped from my hand 
• Phone fell into a toilet, sink, hot tub, swimming pool, lake, etc. 
• Phone dropped from a lap 
• Phone knocked off a table 
• Phone drenched by some liquid 
How quickly could you get back up and running 
if your phone bit the dust?
Story 4: 
“Johnny B. Goode” 
Senior Partner 
Screwem, Goode & Hart 
Attorneys at Law 
Lesson: 
Sh*t happens.
If needed, could you convince 
a Board of Ethics that you had 
done your due diligence in 
protecting your client’s 
information?
Use a Mobile Device 
Management 
solution (MDM) 
My Top 3 List: 
#1
iCloud is NOT an MDM solution 
• made for end users, not business 
• cannot scale up 
• enforces nothing 
• once added onto your staff’s devices, they can: 
• track where you are 
• turn on your personal email, notes and photo 
stream. 
• access all your iCloud data. 
• can also be easily disabled
Top 3 MDM Options 
#1 - Built-in aka Homebrew solution: 
Profile Manager in OS X Server 
• OS X Server, but this is very technical and is a lot of work. Some of the things 
you’ll need: 
• Static IP, FQDN, SSL certificate, configured Server with proper DNS settings 
and more. 
• This is for the DIY person, who’s a techie at heart who also happens to be an 
attorney and does not mind sinking hours into this project. 
• iOS only, Windows and Android not supported. 
Here is an excellent play-by-play manual for those who want to go this route: 
http://krypted.com/mac-os-x/using-profile-manager-3-in-mavericks-server/ 
(email me - for the link if you’d like it)
Top 3 MDM Options 
#2 - Free solution: 
Meraki Systems Manager MDM 
• Very robust solution, developed by Meraki, owned by Cisco. 
• Cloud-based MDM package with which you can get up and running fairly 
easily. 
• Supported Mobile Devices: iOS, Android, Windows Phone 
• Drawback: 
• no support included with free version 
• there is a new paid version ($40/device per year) with many additional 
features. 
https://meraki.cisco.com/products/systems-manager
Top 3 MDM Options 
#3 - Paid solution: 
MaaS360 by Fiberlink, 
an IBM company 
• Maas360 - owned by IBM, paid service ($5/device per month) 
• All inclusive pricing. They never charge extra for set up, activation, or their 
24x7x365 live support. 
• Supports all platforms (iOS, Android, BlackBerry, WebOS, Windows 
Mobile) 
• No device minimums
Add company data 
onto iOS devices 
through profiles 
My Top 3 List: 
(using MDM solution) 
#2
The problem with 
adding info manually, 
is that you have no control; 
it CANNOT be removed remotely. 
Changing the password 
is NOT the same.
7 Profiles You 
Must Use
1. Passcode
2. Wifi
3. VPN
4. Mail
5. Calendar
6. Contacts
7. Apps
Have a BYOD 
policy in place 
My Top 3 List: 
#3
BYOD boils down to a well-drafted 
and comprehensive policy 
that spells out the rights for both 
companies and employees. 
Such a policy covers a company’s: 
• right to monitor, access, review and disclose 
company or other data on a mobile device 
• the employee's expectations of privacy with 
respect to that device. 
*http://www.cio.com/article/2386235/byod/how-to-craft-the-best-byod-policy.html
What does a good BYOD 
policy look like? 
It goes through general rules about personal mobile 
device usage: 
• company's rights with respect to monitoring, 
accessing and reviewing all the data on the device. 
• employee's obligations with respect to keeping the 
device secure, password requirements, all the things 
you'd expect to see in a general IT policy. 
• what happens if you're terminated or decide to leave 
the company.
How to get 
a policy in place? 
• No two BYOD policies are or should be alike. Here 
are 5 BYOD policy templates to help you start: 
• 4 samples here, along with steps to implement: 
http://tek.io/1uLWDsC 
• Our MDM Toolkit with a BYOD template here: 
globalmacit.com/milomdm
tom@globalmacit.com 
facebook.com/globalmac 
linkedin.com/in/tomlambotte 
@LegalMacIT 
Get a FREE copy of my book: 
Hassle Free Mac IT Support for Law Firms 
www.globalmacit.com/book/ 
Q & A

More Related Content

What's hot

New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
SISA Information Security Pvt.Ltd
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
Neil Kemp
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Xavier Mertens
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Security
 
Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
Silvia Afrima Chandra
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
Jeff Lemmermann
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
MarcusBrown87
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringPotato
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
Patrick Bouillaud
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
NowSecure
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
Rui Miguel Feio
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
SHOLOVE INTERNATIONAL LLC
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
BlackBerry
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Chapter4 issues with ict2016
Chapter4 issues with ict2016Chapter4 issues with ict2016
Chapter4 issues with ict2016
asiara
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to Know
NowSecure
 
Bridging the Gap: Securing IP
Bridging the Gap: Securing IPBridging the Gap: Securing IP
Bridging the Gap: Securing IP
ipspat
 

What's hot (20)

New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
Social Engineering and Identity Theft
Social Engineering and Identity TheftSocial Engineering and Identity Theft
Social Engineering and Identity Theft
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Chapter4 issues with ict2016
Chapter4 issues with ict2016Chapter4 issues with ict2016
Chapter4 issues with ict2016
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to Know
 
Bridging the Gap: Securing IP
Bridging the Gap: Securing IPBridging the Gap: Securing IP
Bridging the Gap: Securing IP
 

Similar to How to Secure Your iOs Device and Keep Client Data Safe

Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
Jeremy Quadri
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?
Miradore
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
Mitesh Katira
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
AMD Developer Central
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
Arijit Ghosh
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
Troy C. Fulton
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Barry Caplin
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
Gross, Mendelsohn & Associates
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
McKonly & Asbury, LLP
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
Parag Deodhar
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
Bitglass
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Dinesh O Bareja
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
Sreejith Nair
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
Vince Verbeke
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Conference_by_EVRY
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
Troy C. Fulton
 

Similar to How to Secure Your iOs Device and Keep Client Data Safe (20)

Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 

More from Rocket Matter, LLC

Top 5 Ways to Boost Revenue in 2019
Top 5 Ways to Boost Revenue in 2019Top 5 Ways to Boost Revenue in 2019
Top 5 Ways to Boost Revenue in 2019
Rocket Matter, LLC
 
Rocket Matter's Holiday Gift Guide
Rocket Matter's Holiday Gift Guide Rocket Matter's Holiday Gift Guide
Rocket Matter's Holiday Gift Guide
Rocket Matter, LLC
 
How to Create and Run a Paperless Law Office in 2019
How to Create and Run a Paperless Law Office in 2019How to Create and Run a Paperless Law Office in 2019
How to Create and Run a Paperless Law Office in 2019
Rocket Matter, LLC
 
Legal Project Management Demystified
Legal Project Management Demystified Legal Project Management Demystified
Legal Project Management Demystified
Rocket Matter, LLC
 
Hurricane and Disaster Preparedness for Law Firms
Hurricane and Disaster Preparedness for Law FirmsHurricane and Disaster Preparedness for Law Firms
Hurricane and Disaster Preparedness for Law Firms
Rocket Matter, LLC
 
Make it Rain: The Lawyer's Guide to Getting Paid
Make it Rain: The Lawyer's Guide to Getting PaidMake it Rain: The Lawyer's Guide to Getting Paid
Make it Rain: The Lawyer's Guide to Getting Paid
Rocket Matter, LLC
 
Increase Your Law Firm's Bottom Line with Fixed Cost Reduciton
Increase Your Law Firm's Bottom Line with Fixed Cost ReducitonIncrease Your Law Firm's Bottom Line with Fixed Cost Reduciton
Increase Your Law Firm's Bottom Line with Fixed Cost Reduciton
Rocket Matter, LLC
 
Productivity Hacks and Apps for Lawyers
Productivity Hacks and Apps for LawyersProductivity Hacks and Apps for Lawyers
Productivity Hacks and Apps for Lawyers
Rocket Matter, LLC
 
Automate Your Law Firm with Rocket Matter
Automate Your Law Firm with Rocket Matter Automate Your Law Firm with Rocket Matter
Automate Your Law Firm with Rocket Matter
Rocket Matter, LLC
 
The Lean Law Firm
The Lean Law Firm The Lean Law Firm
The Lean Law Firm
Rocket Matter, LLC
 
The Secrets to a Happy, Successful Legal Career Part 2 of 2
The Secrets to a Happy, Successful Legal Career Part 2 of 2The Secrets to a Happy, Successful Legal Career Part 2 of 2
The Secrets to a Happy, Successful Legal Career Part 2 of 2
Rocket Matter, LLC
 
How to Create and Run a Paperless Law Office in 2018
How to Create and Run a Paperless Law Office in 2018How to Create and Run a Paperless Law Office in 2018
How to Create and Run a Paperless Law Office in 2018
Rocket Matter, LLC
 
Delivering the Ultimate Law Firm Client Service Experience
Delivering the Ultimate Law Firm Client Service ExperienceDelivering the Ultimate Law Firm Client Service Experience
Delivering the Ultimate Law Firm Client Service Experience
Rocket Matter, LLC
 
How Rocket Matter's Atlas Gold Edition Helps You Run a More Flexible Firm
How Rocket Matter's Atlas Gold Edition Helps You Run a More Flexible FirmHow Rocket Matter's Atlas Gold Edition Helps You Run a More Flexible Firm
How Rocket Matter's Atlas Gold Edition Helps You Run a More Flexible Firm
Rocket Matter, LLC
 
How Lawyers Can Easily Offer Alternative Fee Arrangements
How Lawyers Can Easily Offer Alternative Fee ArrangementsHow Lawyers Can Easily Offer Alternative Fee Arrangements
How Lawyers Can Easily Offer Alternative Fee Arrangements
Rocket Matter, LLC
 
Capturing and Converting Phone Leads with Rocket Matter and Ruby
Capturing and Converting Phone Leads with Rocket Matter and RubyCapturing and Converting Phone Leads with Rocket Matter and Ruby
Capturing and Converting Phone Leads with Rocket Matter and Ruby
Rocket Matter, LLC
 
Beyond the Billable Hour: How to Leverage AFAs to Build a Better Practice
Beyond the Billable Hour: How to Leverage AFAs to Build a Better PracticeBeyond the Billable Hour: How to Leverage AFAs to Build a Better Practice
Beyond the Billable Hour: How to Leverage AFAs to Build a Better Practice
Rocket Matter, LLC
 
Boost Revenues in 2017 with Automated Recurring Payments and Workflows
Boost Revenues in 2017 with Automated Recurring Payments and WorkflowsBoost Revenues in 2017 with Automated Recurring Payments and Workflows
Boost Revenues in 2017 with Automated Recurring Payments and Workflows
Rocket Matter, LLC
 
Paperless law office primer 2017 edition
Paperless law office primer 2017 editionPaperless law office primer 2017 edition
Paperless law office primer 2017 edition
Rocket Matter, LLC
 
How to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeHow to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law Practice
Rocket Matter, LLC
 

More from Rocket Matter, LLC (20)

Top 5 Ways to Boost Revenue in 2019
Top 5 Ways to Boost Revenue in 2019Top 5 Ways to Boost Revenue in 2019
Top 5 Ways to Boost Revenue in 2019
 
Rocket Matter's Holiday Gift Guide
Rocket Matter's Holiday Gift Guide Rocket Matter's Holiday Gift Guide
Rocket Matter's Holiday Gift Guide
 
How to Create and Run a Paperless Law Office in 2019
How to Create and Run a Paperless Law Office in 2019How to Create and Run a Paperless Law Office in 2019
How to Create and Run a Paperless Law Office in 2019
 
Legal Project Management Demystified
Legal Project Management Demystified Legal Project Management Demystified
Legal Project Management Demystified
 
Hurricane and Disaster Preparedness for Law Firms
Hurricane and Disaster Preparedness for Law FirmsHurricane and Disaster Preparedness for Law Firms
Hurricane and Disaster Preparedness for Law Firms
 
Make it Rain: The Lawyer's Guide to Getting Paid
Make it Rain: The Lawyer's Guide to Getting PaidMake it Rain: The Lawyer's Guide to Getting Paid
Make it Rain: The Lawyer's Guide to Getting Paid
 
Increase Your Law Firm's Bottom Line with Fixed Cost Reduciton
Increase Your Law Firm's Bottom Line with Fixed Cost ReducitonIncrease Your Law Firm's Bottom Line with Fixed Cost Reduciton
Increase Your Law Firm's Bottom Line with Fixed Cost Reduciton
 
Productivity Hacks and Apps for Lawyers
Productivity Hacks and Apps for LawyersProductivity Hacks and Apps for Lawyers
Productivity Hacks and Apps for Lawyers
 
Automate Your Law Firm with Rocket Matter
Automate Your Law Firm with Rocket Matter Automate Your Law Firm with Rocket Matter
Automate Your Law Firm with Rocket Matter
 
The Lean Law Firm
The Lean Law Firm The Lean Law Firm
The Lean Law Firm
 
The Secrets to a Happy, Successful Legal Career Part 2 of 2
The Secrets to a Happy, Successful Legal Career Part 2 of 2The Secrets to a Happy, Successful Legal Career Part 2 of 2
The Secrets to a Happy, Successful Legal Career Part 2 of 2
 
How to Create and Run a Paperless Law Office in 2018
How to Create and Run a Paperless Law Office in 2018How to Create and Run a Paperless Law Office in 2018
How to Create and Run a Paperless Law Office in 2018
 
Delivering the Ultimate Law Firm Client Service Experience
Delivering the Ultimate Law Firm Client Service ExperienceDelivering the Ultimate Law Firm Client Service Experience
Delivering the Ultimate Law Firm Client Service Experience
 
How Rocket Matter's Atlas Gold Edition Helps You Run a More Flexible Firm
How Rocket Matter's Atlas Gold Edition Helps You Run a More Flexible FirmHow Rocket Matter's Atlas Gold Edition Helps You Run a More Flexible Firm
How Rocket Matter's Atlas Gold Edition Helps You Run a More Flexible Firm
 
How Lawyers Can Easily Offer Alternative Fee Arrangements
How Lawyers Can Easily Offer Alternative Fee ArrangementsHow Lawyers Can Easily Offer Alternative Fee Arrangements
How Lawyers Can Easily Offer Alternative Fee Arrangements
 
Capturing and Converting Phone Leads with Rocket Matter and Ruby
Capturing and Converting Phone Leads with Rocket Matter and RubyCapturing and Converting Phone Leads with Rocket Matter and Ruby
Capturing and Converting Phone Leads with Rocket Matter and Ruby
 
Beyond the Billable Hour: How to Leverage AFAs to Build a Better Practice
Beyond the Billable Hour: How to Leverage AFAs to Build a Better PracticeBeyond the Billable Hour: How to Leverage AFAs to Build a Better Practice
Beyond the Billable Hour: How to Leverage AFAs to Build a Better Practice
 
Boost Revenues in 2017 with Automated Recurring Payments and Workflows
Boost Revenues in 2017 with Automated Recurring Payments and WorkflowsBoost Revenues in 2017 with Automated Recurring Payments and Workflows
Boost Revenues in 2017 with Automated Recurring Payments and Workflows
 
Paperless law office primer 2017 edition
Paperless law office primer 2017 editionPaperless law office primer 2017 edition
Paperless law office primer 2017 edition
 
How to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeHow to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law Practice
 

How to Secure Your iOs Device and Keep Client Data Safe

  • 1. How to Secure Your iOS Device & Keep Client Data Safe Tom Lambotte
  • 3. Story 1: Christine Senior Paralegal and Office Manager Ditcher, Quick & Hyde, Divorce Lawyers
  • 4. Stats on passwords: • Half of iPhone users don’t lock their phones (pre-TouchID). • 10 most common passwords made up 15% of all phones*: • 1234, 0000, 2580, 1111, 5555, 5683 (LOVE), 0852, 2222, 1212 and 1998. • The top four codes represent 10.8 • Years between 1990 and 2000 are all in the top 50, and 1980 to 1989 are in the top 100 passcodes • With a 15 percent success rate, about 1 in 7 iPhones would easily unlock http://www.eweek.com/c/a/Security/Top-10-PIN-Codes-Picked-by-iPhone-Users-637446/#sthash.ihFP9INR.dpuf
  • 5. Story 1: Christine Senior Paralegal and Office Manager Ditcher, Quick & Hyde, Divorce Lawyers Lesson: Trust cannot replace implementing proper and enforceable measures.
  • 6. Story 2: “Johnny” Project Manager GlobalMac IT
  • 7. Stats on disgruntled employees: • Corporate Executive Board survey that showed that 75% of people who leave their jobs are disgruntled when they do so. • There is high risk for lawsuits where private information is revealed: • medical records, mental health treatment records, and drug and alcohol treatment records. • Even bigger problem in smaller firms, where we all know each other and trust everyone. This can lead to complacency which can come back to bite you later on, when least expected. You have a duty to protect client confidences – did you take all reasonable steps to do so? Were your actions appropriate to the risk, considering the capabilities of your firm’s data security?
  • 8. Story 2: “Johnny” Project Manager GlobalMac IT Lesson: Disgruntled Employees Can Cause Chaos
  • 9. Story 3: “Saul Goodman” Attorney Saul Goodman Attorney at Law
  • 10. Stats on theft and stolen devices: • More than 3 million handsets were stolen in 2013 • Theft has increased by 26% in Los Angeles since 2011, 23% in San Fransisco, and 18% of all grand larcenies in New York City last year involved Apple products. http://www.businessinsider.com/smartphone-theft-statistics-2014-5#ixzz3GnMj29cM
  • 11. Stats on the reporting of thefts: • Only 50% of respondents reported a loss or theft within one day. • 38% took between 1 and 2 days • Nearly 10% took up to five days to notify their employer. 19% of the businesses surveyed reported an incident of a lost or stolen device, and experienced some form of related data loss, meaning businesses have approximately a one-in-five chance of losing data if a corporate mobile device is stolen. *Kaspersky Lab survey of global IT security professionals, 9/2014.
  • 12. Story 3: “Saul Goodman” Attorney Saul Goodman Attorney at Law Lesson: Theft happens and are often not immediately reported.
  • 13. Story 4: “Johnny B. Goode” Senior Partner Screwem, Goode & Hart Attorneys at Law
  • 14. Stats on accidental damage: • Theft is scary, but accidental damage is 10 times more common than loss or theft • A study by SquareTrade in 2012, showed that damaged iPhones have cost Americans $5.9 billion since their introduction in 2007. • The top five iPhone accident scenarios according to the study are: • Phone dropped from my hand • Phone fell into a toilet, sink, hot tub, swimming pool, lake, etc. • Phone dropped from a lap • Phone knocked off a table • Phone drenched by some liquid How quickly could you get back up and running if your phone bit the dust?
  • 15. Story 4: “Johnny B. Goode” Senior Partner Screwem, Goode & Hart Attorneys at Law Lesson: Sh*t happens.
  • 16. If needed, could you convince a Board of Ethics that you had done your due diligence in protecting your client’s information?
  • 17. Use a Mobile Device Management solution (MDM) My Top 3 List: #1
  • 18. iCloud is NOT an MDM solution • made for end users, not business • cannot scale up • enforces nothing • once added onto your staff’s devices, they can: • track where you are • turn on your personal email, notes and photo stream. • access all your iCloud data. • can also be easily disabled
  • 19. Top 3 MDM Options #1 - Built-in aka Homebrew solution: Profile Manager in OS X Server • OS X Server, but this is very technical and is a lot of work. Some of the things you’ll need: • Static IP, FQDN, SSL certificate, configured Server with proper DNS settings and more. • This is for the DIY person, who’s a techie at heart who also happens to be an attorney and does not mind sinking hours into this project. • iOS only, Windows and Android not supported. Here is an excellent play-by-play manual for those who want to go this route: http://krypted.com/mac-os-x/using-profile-manager-3-in-mavericks-server/ (email me - for the link if you’d like it)
  • 20. Top 3 MDM Options #2 - Free solution: Meraki Systems Manager MDM • Very robust solution, developed by Meraki, owned by Cisco. • Cloud-based MDM package with which you can get up and running fairly easily. • Supported Mobile Devices: iOS, Android, Windows Phone • Drawback: • no support included with free version • there is a new paid version ($40/device per year) with many additional features. https://meraki.cisco.com/products/systems-manager
  • 21. Top 3 MDM Options #3 - Paid solution: MaaS360 by Fiberlink, an IBM company • Maas360 - owned by IBM, paid service ($5/device per month) • All inclusive pricing. They never charge extra for set up, activation, or their 24x7x365 live support. • Supports all platforms (iOS, Android, BlackBerry, WebOS, Windows Mobile) • No device minimums
  • 22. Add company data onto iOS devices through profiles My Top 3 List: (using MDM solution) #2
  • 23. The problem with adding info manually, is that you have no control; it CANNOT be removed remotely. Changing the password is NOT the same.
  • 24. 7 Profiles You Must Use
  • 32. Have a BYOD policy in place My Top 3 List: #3
  • 33. BYOD boils down to a well-drafted and comprehensive policy that spells out the rights for both companies and employees. Such a policy covers a company’s: • right to monitor, access, review and disclose company or other data on a mobile device • the employee's expectations of privacy with respect to that device. *http://www.cio.com/article/2386235/byod/how-to-craft-the-best-byod-policy.html
  • 34. What does a good BYOD policy look like? It goes through general rules about personal mobile device usage: • company's rights with respect to monitoring, accessing and reviewing all the data on the device. • employee's obligations with respect to keeping the device secure, password requirements, all the things you'd expect to see in a general IT policy. • what happens if you're terminated or decide to leave the company.
  • 35. How to get a policy in place? • No two BYOD policies are or should be alike. Here are 5 BYOD policy templates to help you start: • 4 samples here, along with steps to implement: http://tek.io/1uLWDsC • Our MDM Toolkit with a BYOD template here: globalmacit.com/milomdm
  • 36.
  • 37. tom@globalmacit.com facebook.com/globalmac linkedin.com/in/tomlambotte @LegalMacIT Get a FREE copy of my book: Hassle Free Mac IT Support for Law Firms www.globalmacit.com/book/ Q & A