Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร


Published on

Presentation ของ ผอ. Software Park ให้กับ องค์การโทรศัพท์วันที่ 14 มีนาคม

Published in: Technology, News & Politics
  • Be the first to comment

การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร

  1. 1. การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรAssoc.Prof. Dr. Thanachart NumnondaDirectorSoftware Park Thailand14 March 2012 1
  2. 2. 2
  3. 3. 3
  4. 4. 6 Million SmartPhones in Thailand (4)
  5. 5. More than 400,000 Tablets sold in Thailand 5
  6. 6. Source: wikipedia 6
  7. 7. 7
  8. 8. iCloud 8
  9. 9. 9
  10. 10. Dropbox 10
  11. 11. Open Environment 11
  12. 12. The New Reality for Users Apps & Data Diverse Access Everywhere Points Universal App Windows Catalog and Browser Workflow Legacy Apps Windows SaaS Services Mac Broker Mobile iOS Apps Android Entitlements, Policies and Reporting Data ServicesSource : From Datacenter to Device: Security in the Enterprise 2012 and Beyond : VMWare 12
  13. 13. Work Life BalanceBlurred BoundariesAnywhere AnytimeProductivityStrengths, Interested, Choices 13
  14. 14. SecurityData LossVirusIdentity LossInternet SecuritySocial Media SecurityMobile Security 14
  15. 15. Data Loss Prevention Where is my confidential data stored? Where is my confidential data being sent? How is my confidential data being used? How do I enforce my data loss policies 15Source : Vontu: Security for a wide open world.
  16. 16. Have You Deployed? 16Source : Vontu: Security for a wide open world.
  17. 17. Content Awareness Protection 17Source : Vontu: Security for a wide open world.
  18. 18. Mobile DevicesNotebookSmartphonesTabletsPortable HarddiskThumbDrive 18
  19. 19. Risks Mobile devices are easy to lose or steal Can carry large amount of data Often unprotected Data may be “sniffed” during unprotected wireless communications Results – Broken device – Infections from viruses, spyware, malware – Privacy and personal security concernsSource : CYBER SECURITY ON THE GO: TCU Information 19Security Services
  20. 20. Best PracticesNever store sensitive or confidential informationon a mobile device.Rule of thumb – do not trust wireless to besecure!Avoid joining unknown Wi-fi networksMost apps offer privacy controls – But privacy controls are not always easy to accessAvoid portable harddisk, usb, thumbdrive 20
  21. 21. Data Loss ProtectionDevelop a plan and work with itDevelop a policyReduce the initial scopeUnderstand why you need it, business, HR andLegal alignedAvoid band-aid solutions - integration is key 21
  22. 22. Social Media Security Treats Mobile Apps Social Engineering Social Networking Sites Your Employees Lack of a Social Media PolicySource : 5 Top Social Media Security Threats: Network World 22
  23. 23. Internet Security Treats Advise Your Employees on Safe Internet Conduct Be Wary of Social Engineering Maintain Security Options Password Security Back-up DataSource : 5 simple internet security tips: Evan Godfrey 23
  24. 24. Smart Phone Security Tips Beware of Text Message Spam Use Anti-Virus Software Mind Your Moblie Apps Avoid Wi-Fi Hotspots Keep Your Phone in JailSource : Top 10 Smartphone Security Tips: Joseph Morah 24
  25. 25. Smart Phone Security Tips Turn off Bluetooth Discovery Mode Apply OS update Backup or Sync Your Data Frequently Enable Remote Locate, Lock and Wipe Screen Lock Your PhoneSource : Top 10 Smartphone Security Tips: Joseph Morah 25
  26. 26. Case Studies 26
  27. 27. Thank 27