MOBILE
DEVICES in the
WORKPLACE:
            ur ity
         S  ec
    K ey ks:
  5     R is
meet
CRISTIANO
CRISTIANO is a business man
…and a trivia man
C r i st ia n o ,
Hey
           U KN       OW…
DI D YO
…in 2011, Dubliners left
thousands of personal
items in taxis such as …
as
  et o
         fF
          AL
            SE
                 TE
                    ET
                       H
GS
       DO
     o
tw
C AT
o ne
a few   TOILET SEATS
SH ES
     a lA
 un er
f
an
   d   aB
        AB
          Y
I al most
Oh ! And
forgo t. . .
25,000E PHONES
MOBIL
And that’s just in DUBLIN
Many of those lost devices can store:




10K 20K 200K 500K
PHOTOS WORD DOCS EMAILS       CONTACTS
That’s a lot of
SENSITIVE INFO!
Cristiano, Imag
                ine
if YOUR PHON
                 E
   landed in the
  wrong hands?
Just think about
                 how much
  CORPORATE
                  D A TA
     would be at risk
                      ?
CRISTIANO’S
Confidential
Client Info..
And p
        hysica
is just        l acce
        one ty        ss
SE C U         pe of
       R I TY
              TH R E
                     AT!
Wait, there
are more?
Sadly, YES.
             In fact there
 5 K EY S E CU             are
               RITY RISKS
   everyone mu
                  st know.
Communication
Interception
Look
Familiar?
Think back, wh
                en was the
last time you a
                ccessed a
     Wi-Fi hot spot
                    ?
Hmm, where
  was I?
For companies with employees
    who use Wi-Fi hotspots




   … the stakes are high!
Malicious
 Code
Malware
          attacks a
no longe            re
        r confine
                  d to
       PCs!
In fact,
malwa      mobile
      re thre
  on the      a t s ar e
          rise…
..and continue to
 affect the most
    prevalent
      mobile
    operating
     systems
Here
        ’s an
 fact f       inter
        or yo        estin
in 201        u Cr i       g
        1…           stiano
                            ,
Before
After
w that’s
Wo     ng!
shocki
Device
Attacks
Device atta
                  cks are
typically de
              signed to g
 control of th           a in
              e device an
    access cont           d
                  ent…
…or attempt
a denial of
service
(DOS).
DEVICE ATTACKS
are similar to PC
ATTACKS of the
past, such as…
Browser-based attacks



  Buffer overflow
  expectations




Application-based
attacks
l
      ca
    si s
  y s
Ph c e
  Ac
Cristiano, ar
              en’t Mobile
 Devices the
                perfect
  travel compa
                 nion?
I mean they are…
small
portable
and lightweight.
But that also means,
     they are…

    1. Easy to steal.
   2. Leave behind.
and rem   ember
Oh ,
     th is slide?
25 ,000             S
 MO   BILE PHONE
                      in
left in t axis in Dubl
          alone!
ew  hat
Ah, I se     re.
     did the
y ou      er d og.
Y ou clev
Insider Threats
Threa
     t s c an
 from         also c
        withi        ome
  organ       n you
          isatio     r
                 n.
Malicious
 insiders can
  use mobile
  devices to
leak important
     data.
Sharing corporate
information from a
 smartphone will..
..often circumvent
 robust monitoring
 systems, like Data
  Loss Prevention.
al ly?
 Re       y?
   rio usl
Se
no, REALLY!
Yes Cr   istia
Lets revie   w t he 5 Key
 S e cu r ity Risks one
       more time.
Whether or not your
  company has formall
                      y
adopted mobile devi
                    ces…
They are in your
enterprise.
So what should
   YOU do?
Voice Engineer Ireland

           1 244 9590
 Phon e: 0
                n@v  ei.ie
    l: nla niga
Emai                land
         : @V EI r e
  Tweet
Sounds good
   to m e .

Mobile Device Management - Bring Your Own Device