Why increase of use • Economics: Cheaper Device • Advancement of Technology: Faster processing, more applica;ons (free J) • Ubiquitous – Any;me, Anywhere • Aesthe;cs : Social Trends (ipad’s cool, lets buy)
Mobile Security for the consumer • You lose your phone • Your data / informa;on is stolen • Your communica;ons is leaked
Mobile Security for the Consumer 50 iPhones were purposely “lost” and the researchers recorded the ac;ons that the “ﬁnders” of the smartphones • 72% of smartphone ﬁnders click on a ﬁle named “private photos”. • 57% of smartphone ﬁnders clicked on a ﬁle called “saved passwords”. • 43% of ﬁnders click on an app called “online banking”. • 50% of the smartphones were returned even though all of them contained owner contact informa;on. hCp://ansonalex.com/mobile security
If you lose your phone, what would it reveal ? The truth is people are just nosy : its just in our DNA hCp://ansonalex.com/infographics
Prepare for the worst hCp://ansonalex.com/infographics
Dave Morin, CEO of Path, commented : . . . . We upload the address book to our servers in order to help the user ﬁnd and connect to their friends and family . . .
Tips to data protec7on on an Smartphone • Password protect your device • Use a security app – tracking, secure wipe, etc • Display you contact informa;on on the outside or on the login screen of your smartphone.
Tips to protect personal informa7on on an Smartphone • Be careful of what tap / click / swipe • Be careful when you download and pay aCen;on before giving permission • Be careful when you’re online – use secure protocols
Mobile Security – what is means to the enterpise
Mobile Security to the Corporate • B.Y.O. D Paradigm Shi_ BRING YOUR OWN DEVICE • Due to Consumeriza;on -‐ M.C.Y.A MY iPAD is COOLER than YOUR ANDROID (TAB)
Mobile Security for the Enterprise • Mobile device is lost (with the corporate informa;on) • Corporate data / informa;on in the mobile device is stolen via malicious programs • Corporate communica;ons are leaked when devices connected using insecure protocols
How does corporate handles this Secure the Secure the device data Manage the device Manage the informa;on source A HYBRID MODEL WITH APP WHITELISTING
How does corporate handles this • Policy on BYOD and other Mobile Devices • Use Technology – Applica;on (and whitelis;ng) Management – Informa;on / Access Management – Device Security Management • Unleash the Human Firewall : Awareness
The Art of War, “If you know your enemies and know yourself, you can win a hundred baCles without a single loss.”