SlideShare a Scribd company logo
1 of 13
January 15th, 2015
WELCOME TO CVTEC
Mobile Security
Tablets and Smart Phones
Tim Torian
www.toriangroup.com
President, Torian Group, Inc.
Top Concerns
 Loss
 Unathorized access
 Data loss / Corruption
Should you be concerned?
 --79% report mobile security
incidents in the past year
 --52% of large companies
say cost of mobile security
incidents last year exceeded
$500,000
 --66% say careless
employees greatest security
risk
Theft / Loss
 Set a Pin or password
 Set to automatically lock
 Put your contact info – screen or label
 Activate or install “find my phone” app
 Install security app
 Turn on Encryption
 Turn on Location
 Enable remote wipe if available
 Act immediately if lost
 Under a new law, wireless carriers can render your device useless
Backup
 Take inventory
 Already synced?
 Keep track of your passwords / account logins
 Record your IMEI/MEID (phone ID)
 SD card?
Security Common sense
 Trust not ye public wireless
 Connect over VPN
 Use phone data plan
 Use HTTPS where possible
 Use common Sense
 Don’t click on unknown links
 Don’t respond to unknown SMS
 Install Caller ID App
 Wipe your phone when upgrading
Managing your phone
 Like your PC, install updates for security
 Update your Apps regularly
 Be aware of App Permissions when installing
 Don’t Root your phone
 Turn off unused features:
 Bluetooth
 Infrared / NFC
Apps
 Install only from Google/Apple/Microsoft store
 Make sure it has lots of users – over 100K
 Be careful of linked Apps
 Login with Facebook / Google
 Shared passwords
 Access to contacts etc.
 Uninstall if not needed
 Don’t use devices with corporate data to
entertain your kids.
Malware
 Install only from Google/Apple/Microsoft store
 Make sure it has lots of users – over 100K
 Be careful of linked Apps
 Login with Facebook / Google
 Shared passwords
 Access to contacts etc.
 Uninstall if not needed
 Don’t use devices with corporate data to
entertain your kids.
 Install AntiMalware app
 Trend, BitDefender, Lookout.com
Phishing
 Txting for cash – SMS Scams
 Email – as usual
 Web links
 Fake password notices
 Malicious Apps
 Online Banking scams
Passwords
 Unique complex passwords
 Use a password manager (lastpass, 1password)
 Where possible set a separate password for
linked Apps
 Keep a separate email account for password
recovery, not on your phone
 Use 2 factor authentication where possible
 Automatic login…
Sharing
 Turn off automatic posting where possible
 Share your location with caution
 Be aware of what photos reveal
Pick one thing
Tim Torian
President - Torian Group, Inc.
Microsoft Partner Cisco Authorized HP Authorized partner Dell Partner
• What will you do differently?
• Additional Resources:
www.toriangroup.com/security

More Related Content

What's hot

14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Enterprise Management Associates
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
Human Risk Management
Human Risk ManagementHuman Risk Management
Human Risk ManagementJohn Grennan
 
Infosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness TrainingInfosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness TrainingDavid Alderman
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Smartphone security
Smartphone securitySmartphone security
Smartphone securityMuthu Kumar
 
Private Data and Prying Eyes
Private Data and Prying EyesPrivate Data and Prying Eyes
Private Data and Prying EyesEllie Sherven
 
Small Business Cyber Security Checklist
Small Business Cyber Security ChecklistSmall Business Cyber Security Checklist
Small Business Cyber Security ChecklistGabriel Friedlander
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network SecurityPatten John
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 

What's hot (20)

14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Human Risk Management
Human Risk ManagementHuman Risk Management
Human Risk Management
 
Infosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness TrainingInfosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness Training
 
Avoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile WebAvoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile Web
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Private Data and Prying Eyes
Private Data and Prying EyesPrivate Data and Prying Eyes
Private Data and Prying Eyes
 
Small Business Cyber Security Checklist
Small Business Cyber Security ChecklistSmall Business Cyber Security Checklist
Small Business Cyber Security Checklist
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Security risks with fake apps
Security risks with fake appsSecurity risks with fake apps
Security risks with fake apps
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
 
How To Identify A Fake App In Playstore
How To Identify A Fake App In PlaystoreHow To Identify A Fake App In Playstore
How To Identify A Fake App In Playstore
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
User security awareness
User security awarenessUser security awareness
User security awareness
 

Viewers also liked (10)

Ak. engg profile updated
Ak. engg  profile   updatedAk. engg  profile   updated
Ak. engg profile updated
 
C & A Brokerage Services Presentation
C & A Brokerage Services PresentationC & A Brokerage Services Presentation
C & A Brokerage Services Presentation
 
Employer Branding Presentation
Employer Branding PresentationEmployer Branding Presentation
Employer Branding Presentation
 
Expert Advice on Resume Making & Interview Preparation
Expert Advice on Resume Making & Interview PreparationExpert Advice on Resume Making & Interview Preparation
Expert Advice on Resume Making & Interview Preparation
 
AC Drive VFD - Allen Bradley Powerflex 4M
AC Drive VFD - Allen Bradley Powerflex 4MAC Drive VFD - Allen Bradley Powerflex 4M
AC Drive VFD - Allen Bradley Powerflex 4M
 
NFI - Industrial Pneumatics
NFI - Industrial PneumaticsNFI - Industrial Pneumatics
NFI - Industrial Pneumatics
 
Industrial hydraulics
Industrial hydraulicsIndustrial hydraulics
Industrial hydraulics
 
HMI- Human Machine Interface
HMI-  Human Machine InterfaceHMI-  Human Machine Interface
HMI- Human Machine Interface
 
PLC Troubleshooting & Maintenance
PLC Troubleshooting & MaintenancePLC Troubleshooting & Maintenance
PLC Troubleshooting & Maintenance
 
Allen Bradley- Micrologix PLC Instructions
Allen Bradley- Micrologix PLC InstructionsAllen Bradley- Micrologix PLC Instructions
Allen Bradley- Micrologix PLC Instructions
 

Similar to Mobile Device Security

Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)Hîmãlåy Làdhä
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx4Freedom Mobile
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentationredbackacademy
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14Naval OPSEC
 

Similar to Mobile Device Security (20)

Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Protect
ProtectProtect
Protect
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentation
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 

Mobile Device Security

  • 1. January 15th, 2015 WELCOME TO CVTEC Mobile Security Tablets and Smart Phones Tim Torian www.toriangroup.com President, Torian Group, Inc.
  • 2. Top Concerns  Loss  Unathorized access  Data loss / Corruption
  • 3. Should you be concerned?  --79% report mobile security incidents in the past year  --52% of large companies say cost of mobile security incidents last year exceeded $500,000  --66% say careless employees greatest security risk
  • 4. Theft / Loss  Set a Pin or password  Set to automatically lock  Put your contact info – screen or label  Activate or install “find my phone” app  Install security app  Turn on Encryption  Turn on Location  Enable remote wipe if available  Act immediately if lost  Under a new law, wireless carriers can render your device useless
  • 5. Backup  Take inventory  Already synced?  Keep track of your passwords / account logins  Record your IMEI/MEID (phone ID)  SD card?
  • 6. Security Common sense  Trust not ye public wireless  Connect over VPN  Use phone data plan  Use HTTPS where possible  Use common Sense  Don’t click on unknown links  Don’t respond to unknown SMS  Install Caller ID App  Wipe your phone when upgrading
  • 7. Managing your phone  Like your PC, install updates for security  Update your Apps regularly  Be aware of App Permissions when installing  Don’t Root your phone  Turn off unused features:  Bluetooth  Infrared / NFC
  • 8. Apps  Install only from Google/Apple/Microsoft store  Make sure it has lots of users – over 100K  Be careful of linked Apps  Login with Facebook / Google  Shared passwords  Access to contacts etc.  Uninstall if not needed  Don’t use devices with corporate data to entertain your kids.
  • 9. Malware  Install only from Google/Apple/Microsoft store  Make sure it has lots of users – over 100K  Be careful of linked Apps  Login with Facebook / Google  Shared passwords  Access to contacts etc.  Uninstall if not needed  Don’t use devices with corporate data to entertain your kids.  Install AntiMalware app  Trend, BitDefender, Lookout.com
  • 10. Phishing  Txting for cash – SMS Scams  Email – as usual  Web links  Fake password notices  Malicious Apps  Online Banking scams
  • 11. Passwords  Unique complex passwords  Use a password manager (lastpass, 1password)  Where possible set a separate password for linked Apps  Keep a separate email account for password recovery, not on your phone  Use 2 factor authentication where possible  Automatic login…
  • 12. Sharing  Turn off automatic posting where possible  Share your location with caution  Be aware of what photos reveal
  • 13. Pick one thing Tim Torian President - Torian Group, Inc. Microsoft Partner Cisco Authorized HP Authorized partner Dell Partner • What will you do differently? • Additional Resources: www.toriangroup.com/security