SlideShare a Scribd company logo
Mobile Security and how we take it for granted. By Patrick Vogel Image by Ciccioetneo on flickr
Smartphones and other mobile devices have become an integral part of our work and social lives, with 63% of students in 2010 using some sort of handheld device. Source: ECAR Image by rogersmj on flickr
These devices have become “remote controls for our lives,” through which we can communicate with friends and colleagues, take and store photos and videos, access social media sites, as well as a whole host of other things, all from the palms of our hands. Image by Public Domain Photos on flickr
However, these convenient devices are fraught with numerous security and privacy issues that many users are either not aware of, or choose to ignore. Image by chego101 on flickr
We seem to ignore the fact that we are literally carrying all of our personal information around in our pockets. If your Smartphone is misplaced or stolen, it only takes a few clicks or taps of a screen for someone to access your personal e-mails, (naughty) photos, social networking sites  (which keep you logged in for convenience), or even banking information. Photo by lululemon athletica on flickr
In addition to information that users knowingly put on their Smartphones, both Android phones and iPhones regularly transmit location info back to Google and Apple. On iPhones, a tracking file stores the latitude and longitude of cellphone towers and Wi-Fi access points with which the phone has interacted. Experts may also harvest call logs, map search results from the device’s Google Maps app and logs of what’s been typed into the iPhone’s virtual keyboard from the phone. Source: “Smartphone privacy threats no surprise to security experts”. By Patrick May and Troy Wolverton. Thestar.com, April 27th, 2011. Image by IvyMike on flickr.
These devices contain so much personal information, that smartphone forensics experts refer to them as “digital fingerprints.” Source: “Smartphone privacy threats no surprise to security experts”. By Patrick May and Troy Wolverton. Thestar.com, April 27th, 2011. Image by Phixaakh on flickr
Despite these risks, only 23% of Smartphone owners use the security software installed on their devices. Source: Trend Micro Inc. survey of 1,016 U.S. smartphone users, June 2009 Image by –JvL- on flickr
Most of us wouldn’t dream of operating our Mac or PC without a password and security software, so why doesn’t this caution apply to devices that fit in in the palm of our hand and can be lost in seconds? Photo by D’Arcy Norman on flickr
This relaxed attitude towards mobile security has become a major concern for businesses, which are struggling to keep up with the demands of securing these devices. Image by wwarby on flickr
The large variety of makes and platforms for Smartphones makes it difficult for companies’ IT consultants to uniformly secure important data on employees’ devices. Image by jurvetson on flickr
Another problem is that many employees see their mobile devices as something personal, and not something that IT should control. They see it as something that is “blue and plays music,” not something that needs to be secured. Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010.  Image by Yutaka Tsutano on flickr
Some companies have tried to combat this problem by purchasing standard Smartphones for their employees. However, even this does not stop workers from having “the company phone in their left pocket, and their personal phone in their right.” Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010.  Image by cambodiaforkidsorg on flickr
“Indeed, in a recent study of 300 companies in the U.S. and Europe by Good Technology Inc., a vendor of mobile security and management tools, nearly 80% of the respondents reported an increase in the number of employees who wanted to bring their own devices into the workplace in the past six to 12 months, and 28% reported a data breach because of an unauthorized device.”  Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010.  Image by meddygarnet on flickr
Since securing data is the sole responsibility of the company, there are a number of services available which allow businesses to centrally control password management, authentication authorization, strong encryption, inactivity timeout and remote wiping if a device is stolen or lost. Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010.  Image by CarbonNYC on flickr
A simple solution for individuals looking to keep their information secure is to enable passcode locking on your phone, and SIM card PIN access so that someone who has stolen or found your misplaced phone cannot access its data. Image by .schill on fiickr
If you are unhappy or concerned with the way that companies like Apple and Google track their devices locations, make yourself heard by voting with your dollar and purchasing a product from a company that does not invade their user’s privacy. Imabe by bfishadow on flickr
You should also be wary of mobile privacy when it comes to encounters with the police. Since Smartphones are such a new technology, there are still not clear laws regarding the legality of cellphone searches. So it is important to be cautious and know your rights. Source: “Smartphone Searches Not So Smart” Popular Mechanics, April 22nd, 2011.  Image by swiftmed on flickr
If you’re worried about your Smartphone or other mobile device’s security, don’t panic! Image by Nate Steiner on flickr
Do some research and find out what your options are for security and privacy. Then you can get back to your love affair with your mobile.

More Related Content

What's hot

Mobile security
Mobile securityMobile security
Mobile securityhome
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
Rocket Matter, LLC
 
The Ethics of Artificial Intelligence
The Ethics of Artificial IntelligenceThe Ethics of Artificial Intelligence
The Ethics of Artificial Intelligence
JohnSmith5466
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Richard Common
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption dispute
HaniAbdallah4
 
Digital Lifestyle Trends and Threats
Digital Lifestyle Trends and ThreatsDigital Lifestyle Trends and Threats
Digital Lifestyle Trends and Threats
Andrew Wong
 
Apple vs. FBI
Apple vs. FBIApple vs. FBI
Apple vs. FBI
Andrew Birkeland
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
Lookout
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Craig Walker, CISSP
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
SISA Information Security Pvt.Ltd
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
Jahangirnagar University
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacy
Fabrizio Gramuglio
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
Tzar Umang
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
n|u - The Open Security Community
 
7 new assaults on data privacy
7 new assaults on data privacy7 new assaults on data privacy
7 new assaults on data privacy
Entefy
 

What's hot (20)

Mobile security
Mobile securityMobile security
Mobile security
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
The Ethics of Artificial Intelligence
The Ethics of Artificial IntelligenceThe Ethics of Artificial Intelligence
The Ethics of Artificial Intelligence
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption dispute
 
Digital Lifestyle Trends and Threats
Digital Lifestyle Trends and ThreatsDigital Lifestyle Trends and Threats
Digital Lifestyle Trends and Threats
 
Apple vs. FBI
Apple vs. FBIApple vs. FBI
Apple vs. FBI
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Polinter11
Polinter11Polinter11
Polinter11
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacy
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
7 new assaults on data privacy
7 new assaults on data privacy7 new assaults on data privacy
7 new assaults on data privacy
 
Social engineering
Social engineeringSocial engineering
Social engineering
 

Viewers also liked

Olympics - Let the Games Begin
Olympics - Let the Games BeginOlympics - Let the Games Begin
Olympics - Let the Games Begin
CommPRO.biz
 
TBLC Workshop Lunch & Learn - Utilizing the Cloud
TBLC Workshop Lunch & Learn - Utilizing the CloudTBLC Workshop Lunch & Learn - Utilizing the Cloud
TBLC Workshop Lunch & Learn - Utilizing the Cloud
removed_5e309e772282e93276aa134d5573d500
 
Overview Intel AppUp developer program
Overview Intel AppUp developer programOverview Intel AppUp developer program
Overview Intel AppUp developer program
Intel Developer Zone Community
 
Webtalk 2ª Edição - Aula 5
Webtalk 2ª Edição - Aula 5Webtalk 2ª Edição - Aula 5
Webtalk 2ª Edição - Aula 5Daniel Simon
 
Intel AppUp Java Developer Guide
Intel AppUp Java Developer GuideIntel AppUp Java Developer Guide
Intel AppUp Java Developer Guide
ReadWrite
 

Viewers also liked (6)

Olympics - Let the Games Begin
Olympics - Let the Games BeginOlympics - Let the Games Begin
Olympics - Let the Games Begin
 
TBLC Workshop Lunch & Learn - Utilizing the Cloud
TBLC Workshop Lunch & Learn - Utilizing the CloudTBLC Workshop Lunch & Learn - Utilizing the Cloud
TBLC Workshop Lunch & Learn - Utilizing the Cloud
 
Overview Intel AppUp developer program
Overview Intel AppUp developer programOverview Intel AppUp developer program
Overview Intel AppUp developer program
 
Webtalk 2ª Edição - Aula 5
Webtalk 2ª Edição - Aula 5Webtalk 2ª Edição - Aula 5
Webtalk 2ª Edição - Aula 5
 
Intel AppUp Java Developer Guide
Intel AppUp Java Developer GuideIntel AppUp Java Developer Guide
Intel AppUp Java Developer Guide
 
Elizabethan Group[1]
Elizabethan Group[1]Elizabethan Group[1]
Elizabethan Group[1]
 

Similar to Mobile Security

Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
 
T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2
Tanya Tighe, CRSP
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
Aleque Juneau
 
The new dangers of the mobile world
The new dangers of the mobile worldThe new dangers of the mobile world
The new dangers of the mobile worldMark Tremblay
 
The new dangers of the mobile world
The new dangers of the mobile worldThe new dangers of the mobile world
The new dangers of the mobile worldMark Tremblay
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
Kulani Mahadewa
 
Mobile Practice Management
Mobile Practice ManagementMobile Practice Management
Mobile Practice Management
Clio - Cloud-Based Legal Technology
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
SocialKwan
 
Is it safe to bank on our phones?
Is it safe to bank on our phones?Is it safe to bank on our phones?
Is it safe to bank on our phones?
Queen's University
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
MarcusBrown87
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
J A Bhavsar
 
Out-Smarted!
Out-Smarted!Out-Smarted!
Out-Smarted!
Meghan Wilson
 
Film flipbook mobilities
Film flipbook   mobilitiesFilm flipbook   mobilities
Film flipbook mobilitiesagoody
 
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
CR Group
 
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingCorporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Signals Defense, LLC
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
CAS
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
mayank272369
 
Freedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile WorldFreedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile World
Jessie Helfrich
 
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docxSmartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
whitneyleman54422
 

Similar to Mobile Security (20)

Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
Film project 2
Film project 2Film project 2
Film project 2
 
The new dangers of the mobile world
The new dangers of the mobile worldThe new dangers of the mobile world
The new dangers of the mobile world
 
The new dangers of the mobile world
The new dangers of the mobile worldThe new dangers of the mobile world
The new dangers of the mobile world
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Mobile Practice Management
Mobile Practice ManagementMobile Practice Management
Mobile Practice Management
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
Is it safe to bank on our phones?
Is it safe to bank on our phones?Is it safe to bank on our phones?
Is it safe to bank on our phones?
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 
Out-Smarted!
Out-Smarted!Out-Smarted!
Out-Smarted!
 
Film flipbook mobilities
Film flipbook   mobilitiesFilm flipbook   mobilities
Film flipbook mobilities
 
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
 
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingCorporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Freedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile WorldFreedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile World
 
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docxSmartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docx
 

Recently uploaded

天博体育下载-可靠的网络天博体育下载-网络天博体育下载|【​网址​🎉ac123.net🎉​】
天博体育下载-可靠的网络天博体育下载-网络天博体育下载|【​网址​🎉ac123.net🎉​】天博体育下载-可靠的网络天博体育下载-网络天博体育下载|【​网址​🎉ac123.net🎉​】
天博体育下载-可靠的网络天博体育下载-网络天博体育下载|【​网址​🎉ac123.net🎉​】
arcosarturo900
 
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Peter Gallagher
 
Schematic Diagram MSI MS-7309 - REV 1.0 PDF .pdf
Schematic Diagram MSI MS-7309 - REV 1.0 PDF .pdfSchematic Diagram MSI MS-7309 - REV 1.0 PDF .pdf
Schematic Diagram MSI MS-7309 - REV 1.0 PDF .pdf
nikoloco007
 
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
andreassenrolf537
 
LORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDAR
LORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDARLORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDAR
LORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDAR
lorraineandreiamcidl
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
aozcue
 
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
aozcue
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
peuce
 

Recently uploaded (8)

天博体育下载-可靠的网络天博体育下载-网络天博体育下载|【​网址​🎉ac123.net🎉​】
天博体育下载-可靠的网络天博体育下载-网络天博体育下载|【​网址​🎉ac123.net🎉​】天博体育下载-可靠的网络天博体育下载-网络天博体育下载|【​网址​🎉ac123.net🎉​】
天博体育下载-可靠的网络天博体育下载-网络天博体育下载|【​网址​🎉ac123.net🎉​】
 
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
 
Schematic Diagram MSI MS-7309 - REV 1.0 PDF .pdf
Schematic Diagram MSI MS-7309 - REV 1.0 PDF .pdfSchematic Diagram MSI MS-7309 - REV 1.0 PDF .pdf
Schematic Diagram MSI MS-7309 - REV 1.0 PDF .pdf
 
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
 
LORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDAR
LORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDARLORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDAR
LORRAINE ANDREI_LEQUIGAN_GOOGLE CALENDAR
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
 
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
 

Mobile Security

  • 1. Mobile Security and how we take it for granted. By Patrick Vogel Image by Ciccioetneo on flickr
  • 2. Smartphones and other mobile devices have become an integral part of our work and social lives, with 63% of students in 2010 using some sort of handheld device. Source: ECAR Image by rogersmj on flickr
  • 3. These devices have become “remote controls for our lives,” through which we can communicate with friends and colleagues, take and store photos and videos, access social media sites, as well as a whole host of other things, all from the palms of our hands. Image by Public Domain Photos on flickr
  • 4. However, these convenient devices are fraught with numerous security and privacy issues that many users are either not aware of, or choose to ignore. Image by chego101 on flickr
  • 5. We seem to ignore the fact that we are literally carrying all of our personal information around in our pockets. If your Smartphone is misplaced or stolen, it only takes a few clicks or taps of a screen for someone to access your personal e-mails, (naughty) photos, social networking sites (which keep you logged in for convenience), or even banking information. Photo by lululemon athletica on flickr
  • 6. In addition to information that users knowingly put on their Smartphones, both Android phones and iPhones regularly transmit location info back to Google and Apple. On iPhones, a tracking file stores the latitude and longitude of cellphone towers and Wi-Fi access points with which the phone has interacted. Experts may also harvest call logs, map search results from the device’s Google Maps app and logs of what’s been typed into the iPhone’s virtual keyboard from the phone. Source: “Smartphone privacy threats no surprise to security experts”. By Patrick May and Troy Wolverton. Thestar.com, April 27th, 2011. Image by IvyMike on flickr.
  • 7. These devices contain so much personal information, that smartphone forensics experts refer to them as “digital fingerprints.” Source: “Smartphone privacy threats no surprise to security experts”. By Patrick May and Troy Wolverton. Thestar.com, April 27th, 2011. Image by Phixaakh on flickr
  • 8. Despite these risks, only 23% of Smartphone owners use the security software installed on their devices. Source: Trend Micro Inc. survey of 1,016 U.S. smartphone users, June 2009 Image by –JvL- on flickr
  • 9. Most of us wouldn’t dream of operating our Mac or PC without a password and security software, so why doesn’t this caution apply to devices that fit in in the palm of our hand and can be lost in seconds? Photo by D’Arcy Norman on flickr
  • 10. This relaxed attitude towards mobile security has become a major concern for businesses, which are struggling to keep up with the demands of securing these devices. Image by wwarby on flickr
  • 11. The large variety of makes and platforms for Smartphones makes it difficult for companies’ IT consultants to uniformly secure important data on employees’ devices. Image by jurvetson on flickr
  • 12. Another problem is that many employees see their mobile devices as something personal, and not something that IT should control. They see it as something that is “blue and plays music,” not something that needs to be secured. Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010. Image by Yutaka Tsutano on flickr
  • 13. Some companies have tried to combat this problem by purchasing standard Smartphones for their employees. However, even this does not stop workers from having “the company phone in their left pocket, and their personal phone in their right.” Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010. Image by cambodiaforkidsorg on flickr
  • 14. “Indeed, in a recent study of 300 companies in the U.S. and Europe by Good Technology Inc., a vendor of mobile security and management tools, nearly 80% of the respondents reported an increase in the number of employees who wanted to bring their own devices into the workplace in the past six to 12 months, and 28% reported a data breach because of an unauthorized device.” Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010. Image by meddygarnet on flickr
  • 15. Since securing data is the sole responsibility of the company, there are a number of services available which allow businesses to centrally control password management, authentication authorization, strong encryption, inactivity timeout and remote wiping if a device is stolen or lost. Source: “Smartphones need smart security practices” Mary Brandel, computerworld.com, January 18th, 2010. Image by CarbonNYC on flickr
  • 16. A simple solution for individuals looking to keep their information secure is to enable passcode locking on your phone, and SIM card PIN access so that someone who has stolen or found your misplaced phone cannot access its data. Image by .schill on fiickr
  • 17. If you are unhappy or concerned with the way that companies like Apple and Google track their devices locations, make yourself heard by voting with your dollar and purchasing a product from a company that does not invade their user’s privacy. Imabe by bfishadow on flickr
  • 18. You should also be wary of mobile privacy when it comes to encounters with the police. Since Smartphones are such a new technology, there are still not clear laws regarding the legality of cellphone searches. So it is important to be cautious and know your rights. Source: “Smartphone Searches Not So Smart” Popular Mechanics, April 22nd, 2011. Image by swiftmed on flickr
  • 19. If you’re worried about your Smartphone or other mobile device’s security, don’t panic! Image by Nate Steiner on flickr
  • 20. Do some research and find out what your options are for security and privacy. Then you can get back to your love affair with your mobile.