SlideShare a Scribd company logo
Mobile and Remote Best
Practices
How can you protect your laptop or
internet-enabled device?
 Password-protect your computer.
 Keep your valuables with you at all times - When
traveling, keep your device with you.
 Downplay your laptop or mobile device - There is no
need to advertise to thieves that you have a laptop or
mobile device.
 Be aware of your surroundings.
 Consider an alarm or lock…
 Back up your files…
Holiday Traveling with Personal
Internet-Enabled Devices
 Do not use public Wi-Fi networks
 Avoid using open Wi-Fi networks to conduct personal
business, bank, or shop online.
 Turn off Bluetooth when not in use
 Bluetooth-enabled accessories can be
helpful, such as earpieces for hands-free
talking and external keyboards for ease of
typing.
 Be cautious when charging
 Avoid connecting your mobile
device to any computer or charging
station that you do not control, such
as a charging station at an airport
terminal or a shared computer at a
library.
How can you protect yourself?
 Remember physical security…
 Keep software up to date…
 Use good passwords - Choose devices that allow you to
protect your information with passwords.
 Disable remote (Bluetooth / NFC / Wi-Fi) connectivity…
 Encrypt files - If you are storing personal or corporate
information, see if your device offers the option to
encrypt the files…
What security risks are associated with
USB drives?
 Take advantage of security features - Use
passwords and encryption on your USB drive to
protect your data…
 Keep personal and business USB drives
separate…
 Do not plug an unknown USB drive into your computer -
If you find a USB drive, give it to the appropriate
authorities (a location's security personnel, your
organization's IT department, etc.)…
 Disable Autorun - The Autorun feature causes removable
media such as CDs, DVDs, and USB drives to open
automatically when they are inserted into a drive…
Defending Mobile/Smart Phones and
Tablets Against Attack
 Follow general guidelines for
protecting portable devices…
 Be careful about posting your cell
phone number and email address…
 Do not follow links sent in email or text
messages…
 Be wary of downloadable software…

More Related Content

PPTX
6thgrade ch.4sec.4informationsuperhighway
PDF
Information Security
PPTX
Security Awareness 9 10 09 V4 Protect Equip
PPT
INTRODUCTION TO SECURITY
PDF
mobile_security best practices and protection
PPTX
Module 3 Computers_and_Mobile_Devices_Security.pptx
PPTX
Outside the Office: Mobile Security
PPTX
Mobile Device Security
6thgrade ch.4sec.4informationsuperhighway
Information Security
Security Awareness 9 10 09 V4 Protect Equip
INTRODUCTION TO SECURITY
mobile_security best practices and protection
Module 3 Computers_and_Mobile_Devices_Security.pptx
Outside the Office: Mobile Security
Mobile Device Security

Similar to 4 mobile and remote best practices (20)

PPTX
Security Awareness 101
PDF
Resources for Lawyers Who Have Experienced Theft of Client Information
PPTX
PPTX
UNIT-3-Cybercrime Mobile and Wireless Devices-1.pptx
PDF
Small Business Quick Wins Guide
PPTX
Unit-3.pptx
DOC
Mobile Device Security Policy
PDF
3 steps security
PPTX
Mobile Device Security
PDF
Building a culture of security
PPT
Secure Mobile Working 1.0
PDF
Mobile phone security
PDF
Cyber security and mobile devices
PPT
Module5 desktop-laptop-security-b
PDF
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
PPTX
Information Security User Awareness Training.pptx
DOCX
How to keep Your Gadgets Safe When Travelling
PPTX
Securing your digital life - Jason Addie
PDF
Mc physics colloquium2018-03-30.-handouts
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness 101
Resources for Lawyers Who Have Experienced Theft of Client Information
UNIT-3-Cybercrime Mobile and Wireless Devices-1.pptx
Small Business Quick Wins Guide
Unit-3.pptx
Mobile Device Security Policy
3 steps security
Mobile Device Security
Building a culture of security
Secure Mobile Working 1.0
Mobile phone security
Cyber security and mobile devices
Module5 desktop-laptop-security-b
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
Information Security User Awareness Training.pptx
How to keep Your Gadgets Safe When Travelling
Securing your digital life - Jason Addie
Mc physics colloquium2018-03-30.-handouts
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Ad

More from mohamad Hamizi (7)

PPTX
8 login passwords
PPTX
7 social engineering and insider threats
PPTX
6 protecting your computer
PPTX
5 instant messaging and email
PPTX
3 ensuring physical and data security
PPTX
2 cybersecurity best practices
PPTX
1 understanding cyber threats
8 login passwords
7 social engineering and insider threats
6 protecting your computer
5 instant messaging and email
3 ensuring physical and data security
2 cybersecurity best practices
1 understanding cyber threats
Ad

Recently uploaded (20)

PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Lesson notes of climatology university.
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
master seminar digital applications in india
PPTX
Cell Types and Its function , kingdom of life
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Computing-Curriculum for Schools in Ghana
PDF
RMMM.pdf make it easy to upload and study
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Lesson notes of climatology university.
Sports Quiz easy sports quiz sports quiz
Microbial disease of the cardiovascular and lymphatic systems
Microbial diseases, their pathogenesis and prophylaxis
master seminar digital applications in india
Cell Types and Its function , kingdom of life
STATICS OF THE RIGID BODIES Hibbelers.pdf
Basic Mud Logging Guide for educational purpose
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Computing-Curriculum for Schools in Ghana
RMMM.pdf make it easy to upload and study
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
FourierSeries-QuestionsWithAnswers(Part-A).pdf
human mycosis Human fungal infections are called human mycosis..pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Abdominal Access Techniques with Prof. Dr. R K Mishra

4 mobile and remote best practices

  • 1. Mobile and Remote Best Practices
  • 2. How can you protect your laptop or internet-enabled device?  Password-protect your computer.  Keep your valuables with you at all times - When traveling, keep your device with you.
  • 3.  Downplay your laptop or mobile device - There is no need to advertise to thieves that you have a laptop or mobile device.  Be aware of your surroundings.
  • 4.  Consider an alarm or lock…  Back up your files…
  • 5. Holiday Traveling with Personal Internet-Enabled Devices  Do not use public Wi-Fi networks  Avoid using open Wi-Fi networks to conduct personal business, bank, or shop online.
  • 6.  Turn off Bluetooth when not in use  Bluetooth-enabled accessories can be helpful, such as earpieces for hands-free talking and external keyboards for ease of typing.
  • 7.  Be cautious when charging  Avoid connecting your mobile device to any computer or charging station that you do not control, such as a charging station at an airport terminal or a shared computer at a library.
  • 8. How can you protect yourself?  Remember physical security…  Keep software up to date…
  • 9.  Use good passwords - Choose devices that allow you to protect your information with passwords.  Disable remote (Bluetooth / NFC / Wi-Fi) connectivity…
  • 10.  Encrypt files - If you are storing personal or corporate information, see if your device offers the option to encrypt the files…
  • 11. What security risks are associated with USB drives?  Take advantage of security features - Use passwords and encryption on your USB drive to protect your data…  Keep personal and business USB drives separate…
  • 12.  Do not plug an unknown USB drive into your computer - If you find a USB drive, give it to the appropriate authorities (a location's security personnel, your organization's IT department, etc.)…
  • 13.  Disable Autorun - The Autorun feature causes removable media such as CDs, DVDs, and USB drives to open automatically when they are inserted into a drive…
  • 14. Defending Mobile/Smart Phones and Tablets Against Attack  Follow general guidelines for protecting portable devices…  Be careful about posting your cell phone number and email address…
  • 15.  Do not follow links sent in email or text messages…  Be wary of downloadable software…

Editor's Notes

  • #3: Password-protect your computer - Make sure that you have to enter a password to log in to your computer or mobile device Keep your valuables with you at all times - When traveling, keep your device with you. Meal times are optimum times for thieves to check hotel rooms for unattended laptops. If you are attending a conference or trade show, be especially wary—these venues offer thieves a wider selection of devices that are likely to contain sensitive information, and the conference sessions offer more opportunities for thieves to access guest rooms.
  • #4: Downplay your laptop or mobile device - There is no need to advertise to thieves that you have a laptop or mobile device. Avoid using your device in public areas, and consider non-traditional bags for carrying your laptop. Be aware of your surroundings - If you do use your laptop or mobile device in a public area, pay attention to people around you. Take precautions to shield yourself from "shoulder surfers"—make sure that no one can see you type your passwords or see any sensitive information on your screen.
  • #5: Consider an alarm or lock - Many companies sell alarms or locks that you can use to protect or secure your laptop. If you travel often or will be in a heavily populated area, you may want to consider investing in an alarm for your laptop bag or a lock to secure your laptop to a piece of furniture. Back up your files - If your mobile device is stolen, it's bad enough that someone else may be able to access your information. To avoid losing all of the information, make backups of important information and store the backups in a separate location (see Good Security Habits for more information). Not only will you still be able to access the information, but you'll be able to identify and report exactly what information is at risk.
  • #6: Open Wi-Fi networks at places such as airports, coffee shops, and other public locations present an opportunity for attackers to intercept sensitive information that you would provide to complete an online transaction.
  • #7: When these devices are not in use, turn off the Bluetooth setting on your phone. Cyber criminals have the capability to pair with your phone's open Bluetooth connection when you are not using it and steal personal information.
  • #8: Connecting a mobile device to a computer using a USB cable can allow software running on that computer to interact with the phone in ways that a user may not anticipate. As a result, a malicious computer could gain access to your sensitive data or install new software. Don't Fall Victim to Phishing Scams If you are in the shopping mode, an email that appears to be from a legitimate retailer might be difficult to resist. If the deal looks too good to be true, or the link in the email or attachment to the text seems suspicious, do not click on it!
  • #9: Remember physical security - Having physical access to a device makes it easier for an attacker to extract or corrupt information. Do not leave your device unattended in public or easily accessible areas Keep software up to date - If the vendor releases updates for the software operating your device, install them as soon as possible. Installing them will prevent attackers from being able to take advantage of known problems or vulnerabilities
  • #10: Use good passwords - Choose devices that allow you to protect your information with passwords. Select passwords that will be difficult for thieves to guess, and use different passwords for different programs and devices Disable remote connectivity - Some mobile devices are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers.
  • #11: By encrypting files, you ensure that unauthorized people can't view data even if they can physically access it. When you use encryption, it is important to remember your passwords and passphrases; if you forget or lose them, you may lose your data.
  • #12: Take advantage of security features - Use passwords and encryption on your USB drive to protect your data, and make sure that you have the information backed up in case your drive is lost Keep personal and business USB drives separate - Do not use personal USB drives on computers owned by your organization, and do not plug USB drives containing corporate information into your personal computer.
  • #13: Use and maintain security software, and keep all software up to date - Use a firewall, anti-virus software, and anti-spyware software to make your computer less vulnerable to attacks, and make sure to keep the virus definitions current Do not plug an unknown USB drive into your computer - If you find a USB drive, give it to the appropriate authorities (a location's security personnel, your organization's IT department, etc.). Do not plug it into your computer to view the contents or to try to identify the owner.
  • #14: By disabling Autorun, you can prevent malicious code on an infected USB drive from opening automatically
  • #15: Follow general guidelines for protecting portable devices - Take precautions to secure your cell phone and PDA the same way you should secure your computer Be careful about posting your cell phone number and email address - Attackers often use software that browses web sites for email addresses. These addresses then become targets for attacks and spam 
  • #16: Do not follow links sent in email or text messages - Be suspicious of URLs sent in unsolicited email or text messages. While the links may appear to be legitimate, they may actually direct you to a malicious web site. Be wary of downloadable software - There are many sites that offer games and other software you can download onto your cell phone or PDA. This software could include malicious code. Avoid downloading files from sites that you do not trust. If you are getting the files from a supposedly secure site, look for a web site certificate