SlideShare a Scribd company logo
Mobile	
  Security	
  and	
  what	
  it	
  
      means	
  to	
  You	
  
               Busy	
  Body	
  
Agenda	
  
•    Mobile	
  Security	
  :	
  Interes;ng	
  Facts	
  
•    Mobile	
  Security	
  and	
  the	
  Consumer	
  
•    Mobile	
  Security	
  and	
  the	
  Enterprise	
  
•    Mobile	
  Security	
  –	
  what	
  can	
  you	
  do?	
  
•    Ques;on	
  and	
  Answers	
  
Interes;ng	
  Facts	
  




                hCp://ansonalex.com/infographics	
  
Interes;ng	
  Facts	
  




                hCp://ansonalex.com/infographics	
  
Interes;ng	
  Facts	
  




                hCp://ansonalex.com/infographics	
  
Why	
  increase	
  of	
  use	
  
•  Economics:	
  Cheaper	
  Device	
  

•  Advancement	
  of	
  Technology:	
  Faster	
  processing,	
  
   more	
  applica;ons	
  (free	
  J)	
  

•  Ubiquitous	
  –	
  Any;me,	
  Anywhere	
  

•  Aesthe;cs	
  :	
  Social	
  Trends	
  (ipad’s	
  cool,	
  lets	
  buy)	
  
Mobile	
  Security	
  for	
  the	
  consumer	
  
•  You	
  lose	
  your	
  phone	
  
	
  
•  Your	
  data	
  /	
  informa;on	
  is	
  stolen	
  

•  Your	
  communica;ons	
  is	
  leaked	
  
Mobile	
  Security	
  for	
  the	
  Consumer	
  
50	
  iPhones	
  were	
  purposely	
  “lost”	
  and	
  the	
  researchers	
  
recorded	
  the	
  ac;ons	
  that	
  the	
  “finders”	
  of	
  the	
  
smartphones	
  
•  72%	
  of	
  smartphone	
  finders	
  click	
  on	
  a	
  file	
  named	
  
   “private	
  photos”.	
  
•  57%	
  of	
  smartphone	
  finders	
  clicked	
  on	
  a	
  file	
  called	
  
   “saved	
  passwords”.	
  
•  43%	
  of	
  finders	
  click	
  on	
  an	
  app	
  called	
  “online	
  banking”.	
  
•  50%	
  of	
  the	
  smartphones	
  were	
  returned	
  even	
  though	
  
   all	
  of	
  them	
  contained	
  owner	
  contact	
  informa;on.	
  

                                                      hCp://ansonalex.com/mobile	
  security	
  
If	
  you	
  lose	
  your	
  phone,	
  what	
  would	
  it	
  
                        reveal	
  ?	
  
       The	
  truth	
  is	
  people	
  are	
  just	
  nosy	
  :	
  its	
  
                        just	
  in	
  our	
  DNA	
  




                                               hCp://ansonalex.com/infographics	
  
Prepare	
  for	
  the	
  worst	
  




                       hCp://ansonalex.com/infographics	
  
Dave	
  Morin,	
  CEO	
  of	
  Path,	
  commented	
  :	
  
	
  .	
  .	
  .	
  .	
  	
  We	
  upload	
  the	
  address	
  book	
  to	
  our	
  servers	
  in	
  order	
  to	
  help	
  
the	
  user	
  find	
  and	
  connect	
  to	
  their	
  friends	
  and	
  family	
  .	
  .	
  .	
  	
  	
  
Mobile security and what it means to you bb
Tips	
  to	
  data	
  protec7on	
  on	
  an	
  
                        Smartphone	
  
•  Password	
  protect	
  your	
  device	
  

•  Use	
  a	
  security	
  app	
  –	
  tracking,	
  secure	
  wipe,	
  etc	
  	
  

•  Display	
  you	
  contact	
  informa;on	
  on	
  the	
  
   outside	
  or	
  on	
  the	
  login	
  screen	
  of	
  your	
  
   smartphone.	
  
Tips	
  to	
  protect	
  personal	
  informa7on	
  
                 on	
  an	
  Smartphone	
  
•  Be	
  careful	
  of	
  what	
  tap	
  /	
  click	
  /	
  swipe	
  

•  Be	
  careful	
  when	
  you	
  download	
  and	
  pay	
  
   aCen;on	
  before	
  giving	
  permission	
  

•  Be	
  careful	
  when	
  you’re	
  online	
  –	
  use	
  secure	
  
   protocols	
  
Mobile	
  Security	
  –	
  what	
  is	
  means	
  to	
  the	
  
                 enterpise	
  
Mobile	
  Security	
  to	
  the	
  Corporate	
  
•  B.Y.O.	
  D	
  Paradigm	
  Shi_	
  

BRING	
  	
  YOUR	
  	
  OWN	
  	
  DEVICE	
  


•  Due	
  to	
  Consumeriza;on	
  -­‐	
  M.C.Y.A	
  	
  

MY	
  	
  iPAD	
  	
  is	
  	
  COOLER	
  	
  than	
  	
  YOUR	
  	
  ANDROID	
  	
  (TAB)	
  	
  
	
  
Mobile	
  Security	
  for	
  the	
  Enterprise	
  
•  Mobile	
  device	
  is	
  lost	
  (with	
  the	
  corporate	
  
     informa;on)	
  
	
  
•  Corporate	
  data	
  /	
  informa;on	
  in	
  the	
  mobile	
  
     device	
  is	
  stolen	
  via	
  malicious	
  programs	
  

•  Corporate	
  communica;ons	
  are	
  leaked	
  when	
  
   devices	
  connected	
  using	
  insecure	
  protocols	
  
How	
  does	
  corporate	
  handles	
  this	
  


 Secure	
  the	
                                 Secure	
  the	
  
   device	
                                         data	
  

Manage	
  the	
  device	
                  Manage	
  the	
  informa;on	
  
                                                     source	
  


         A	
  HYBRID	
  MODEL	
  WITH	
  APP	
  WHITELISTING	
  	
  
How	
  does	
  corporate	
  handles	
  this	
  
•  Policy	
  on	
  BYOD	
  and	
  other	
  Mobile	
  Devices	
  

•  Use	
  Technology	
  
    –  Applica;on	
  (and	
  whitelis;ng)	
  Management	
  
    –  Informa;on	
  /	
  Access	
  Management	
  
    –  Device	
  Security	
  Management	
  


•  Unleash	
  the	
  Human	
  Firewall	
  :	
  Awareness	
  
The	
  Art	
  of	
  War,	
  	
  
“If	
  you	
  know	
  your	
  enemies	
  and	
  know	
  yourself,	
  
you	
  can	
  win	
  a	
  hundred	
  baCles	
  without	
  a	
  single	
  
                                   loss.”	
  	
  
THANK	
  YOU	
  

More Related Content

PDF
Cyber crime awareness
PPTX
Computing on the Move - Mobile Security
PPTX
Securing hand held computing devices
PDF
New trends in Payments Security: NFC & Mobile
PPTX
Smartphone and mobile device safety & security
PDF
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
PDF
Mobile Device Management & Data Protection
PDF
AITP Presentation on Mobile Security
Cyber crime awareness
Computing on the Move - Mobile Security
Securing hand held computing devices
New trends in Payments Security: NFC & Mobile
Smartphone and mobile device safety & security
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Device Management & Data Protection
AITP Presentation on Mobile Security

What's hot (20)

PPTX
Data-Centric Protection: The Future of BYOD Security
PPTX
IoT Devices Expanding Your Digital Footprint
PPTX
Webinar Express: Securing BYOD without MDM
PPTX
Mobile phones are nuisance
PPSX
smartphones
PPTX
Secure mobile content SharePoint Best Practices Conference 2013
PPTX
Introducing Security Guardian from ExactTrak
PDF
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
PPTX
Teacher awareness talk slides
PPTX
Achieving Secure BYOD in Government Agencies
PPTX
How to Prevent Identity Theft
PPTX
Internet of things
PPTX
Accellion - The European Information Security Summit, London
PPTX
Security Guardian LinkedIn
PDF
3 steps security
PPTX
IT: Innova with Huawei and EOI
KEY
Smartphone security
PDF
Cyber Security - ICCT Colleges
PPTX
Mobile technology assistive technology
PDF
Hack the World: IT/IOT/ICS SCADA OSINT
Data-Centric Protection: The Future of BYOD Security
IoT Devices Expanding Your Digital Footprint
Webinar Express: Securing BYOD without MDM
Mobile phones are nuisance
smartphones
Secure mobile content SharePoint Best Practices Conference 2013
Introducing Security Guardian from ExactTrak
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Teacher awareness talk slides
Achieving Secure BYOD in Government Agencies
How to Prevent Identity Theft
Internet of things
Accellion - The European Information Security Summit, London
Security Guardian LinkedIn
3 steps security
IT: Innova with Huawei and EOI
Smartphone security
Cyber Security - ICCT Colleges
Mobile technology assistive technology
Hack the World: IT/IOT/ICS SCADA OSINT
Ad

Viewers also liked (19)

DOCX
Fiera di mirandola
PPT
PPT
Valuation
DOC
Meo vat voi word
PPT
Tiziano ferro 2
PPT
Projet Coménius Du salé au sucré 2014
DOC
Programma in italia 4 15 aprile 2014
PPT
La settimana italiana
DOC
Danh muc mau don, tkhc ap dung tai cap xa(bo sung)
PDF
International
PPT
Najme Teachnology
PPT
Corporate Blogging For Gsm 2
PDF
Designing the future vision of libraries
PPT
Sponsor Anytime Sales Presentation 2009 02
PDF
Job Search Rules Of The Road
PPT
Resume Of Tom Jackson
PDF
Design thinking for designing and delivering services
PPT
Novo Logic 2008 Future Vision V2
PPTX
Redesigning evidence based practice for wicked problems
Fiera di mirandola
Valuation
Meo vat voi word
Tiziano ferro 2
Projet Coménius Du salé au sucré 2014
Programma in italia 4 15 aprile 2014
La settimana italiana
Danh muc mau don, tkhc ap dung tai cap xa(bo sung)
International
Najme Teachnology
Corporate Blogging For Gsm 2
Designing the future vision of libraries
Sponsor Anytime Sales Presentation 2009 02
Job Search Rules Of The Road
Resume Of Tom Jackson
Design thinking for designing and delivering services
Novo Logic 2008 Future Vision V2
Redesigning evidence based practice for wicked problems
Ad

Similar to Mobile security and what it means to you bb (20)

PPTX
Outside the Office: Mobile Security
PDF
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
PPTX
Mobile Security
PPTX
Mobile security
PPTX
Mobile Device Security
PPTX
Smartphone apps
PDF
Smartphone Smart Card 061013
PDF
Why Managing Mobility Matters
PDF
Smartphone 7 aug14
PDF
Managing Mobile Business Insecurities
PPTX
Mobile Security for the Modern Tech Mogul
PDF
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
PPTX
Private Data and Prying Eyes
PDF
Mobile malware and enterprise security v 1.2_0
PDF
BYOD: Device Control in the Wild, Wild, West
PDF
Mobile phone security
PDF
Securing mobile devices 1
PDF
Securing mobile devices_in_the_business_environment
PDF
Business Travel Executive, Rough Edges
PDF
Mobile Security
Outside the Office: Mobile Security
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
Mobile Security
Mobile security
Mobile Device Security
Smartphone apps
Smartphone Smart Card 061013
Why Managing Mobility Matters
Smartphone 7 aug14
Managing Mobile Business Insecurities
Mobile Security for the Modern Tech Mogul
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
Private Data and Prying Eyes
Mobile malware and enterprise security v 1.2_0
BYOD: Device Control in the Wild, Wild, West
Mobile phone security
Securing mobile devices 1
Securing mobile devices_in_the_business_environment
Business Travel Executive, Rough Edges
Mobile Security

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Cloud computing and distributed systems.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Approach and Philosophy of On baking technology
PDF
Modernizing your data center with Dell and AMD
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
KodekX | Application Modernization Development
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation_ Review paper, used for researhc scholars
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Cloud computing and distributed systems.
MYSQL Presentation for SQL database connectivity
Building Integrated photovoltaic BIPV_UPV.pdf
Network Security Unit 5.pdf for BCA BBA.
Reach Out and Touch Someone: Haptics and Empathic Computing
Approach and Philosophy of On baking technology
Modernizing your data center with Dell and AMD
Spectral efficient network and resource selection model in 5G networks
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
CIFDAQ's Market Insight: SEC Turns Pro Crypto
KodekX | Application Modernization Development
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Advanced methodologies resolving dimensionality complications for autism neur...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”

Mobile security and what it means to you bb

  • 1. Mobile  Security  and  what  it   means  to  You   Busy  Body  
  • 2. Agenda   •  Mobile  Security  :  Interes;ng  Facts   •  Mobile  Security  and  the  Consumer   •  Mobile  Security  and  the  Enterprise   •  Mobile  Security  –  what  can  you  do?   •  Ques;on  and  Answers  
  • 3. Interes;ng  Facts   hCp://ansonalex.com/infographics  
  • 4. Interes;ng  Facts   hCp://ansonalex.com/infographics  
  • 5. Interes;ng  Facts   hCp://ansonalex.com/infographics  
  • 6. Why  increase  of  use   •  Economics:  Cheaper  Device   •  Advancement  of  Technology:  Faster  processing,   more  applica;ons  (free  J)   •  Ubiquitous  –  Any;me,  Anywhere   •  Aesthe;cs  :  Social  Trends  (ipad’s  cool,  lets  buy)  
  • 7. Mobile  Security  for  the  consumer   •  You  lose  your  phone     •  Your  data  /  informa;on  is  stolen   •  Your  communica;ons  is  leaked  
  • 8. Mobile  Security  for  the  Consumer   50  iPhones  were  purposely  “lost”  and  the  researchers   recorded  the  ac;ons  that  the  “finders”  of  the   smartphones   •  72%  of  smartphone  finders  click  on  a  file  named   “private  photos”.   •  57%  of  smartphone  finders  clicked  on  a  file  called   “saved  passwords”.   •  43%  of  finders  click  on  an  app  called  “online  banking”.   •  50%  of  the  smartphones  were  returned  even  though   all  of  them  contained  owner  contact  informa;on.   hCp://ansonalex.com/mobile  security  
  • 9. If  you  lose  your  phone,  what  would  it   reveal  ?   The  truth  is  people  are  just  nosy  :  its   just  in  our  DNA   hCp://ansonalex.com/infographics  
  • 10. Prepare  for  the  worst   hCp://ansonalex.com/infographics  
  • 11. Dave  Morin,  CEO  of  Path,  commented  :    .  .  .  .    We  upload  the  address  book  to  our  servers  in  order  to  help   the  user  find  and  connect  to  their  friends  and  family  .  .  .      
  • 13. Tips  to  data  protec7on  on  an   Smartphone   •  Password  protect  your  device   •  Use  a  security  app  –  tracking,  secure  wipe,  etc     •  Display  you  contact  informa;on  on  the   outside  or  on  the  login  screen  of  your   smartphone.  
  • 14. Tips  to  protect  personal  informa7on   on  an  Smartphone   •  Be  careful  of  what  tap  /  click  /  swipe   •  Be  careful  when  you  download  and  pay   aCen;on  before  giving  permission   •  Be  careful  when  you’re  online  –  use  secure   protocols  
  • 15. Mobile  Security  –  what  is  means  to  the   enterpise  
  • 16. Mobile  Security  to  the  Corporate   •  B.Y.O.  D  Paradigm  Shi_   BRING    YOUR    OWN    DEVICE   •  Due  to  Consumeriza;on  -­‐  M.C.Y.A     MY    iPAD    is    COOLER    than    YOUR    ANDROID    (TAB)      
  • 17. Mobile  Security  for  the  Enterprise   •  Mobile  device  is  lost  (with  the  corporate   informa;on)     •  Corporate  data  /  informa;on  in  the  mobile   device  is  stolen  via  malicious  programs   •  Corporate  communica;ons  are  leaked  when   devices  connected  using  insecure  protocols  
  • 18. How  does  corporate  handles  this   Secure  the   Secure  the   device   data   Manage  the  device   Manage  the  informa;on   source   A  HYBRID  MODEL  WITH  APP  WHITELISTING    
  • 19. How  does  corporate  handles  this   •  Policy  on  BYOD  and  other  Mobile  Devices   •  Use  Technology   –  Applica;on  (and  whitelis;ng)  Management   –  Informa;on  /  Access  Management   –  Device  Security  Management   •  Unleash  the  Human  Firewall  :  Awareness  
  • 20. The  Art  of  War,     “If  you  know  your  enemies  and  know  yourself,   you  can  win  a  hundred  baCles  without  a  single   loss.”