Agenda  Top 12 security recommendations  Google Android specific recommendations  Apple iOS (iPad and iPhone) specific recommendations  General Fermilab.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Fox Scientific, Inc. ONLINE ORDERING 101. Welcome to our website On our main page you can find current promotions, the vendors we offer, technical references.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Objectives Overview Define an operating system
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
The Natural way for Secure Mobile v.1.4
SECURITY CHECK Protecting Your System and Yourself Source:
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Your NEW Social Services Verification Tool
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
Mobile Phone Theft. Serving our communities and protecting them from harm Introduction Mobile Phone Theft There were an estimated 742,000 victims of mobile.
Penn State University College Of Education Understanding College of Education Resources.
A+ Certification Guide Chapter 10 Mobile Devices.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Securing Information in the Higher Education Office.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
Troubleshooting Windows Vista Security Chapter 4.
Explain the purpose of an operating system
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Specialist communication channel. Sarah-Jane king.
INTERNET SAFETY FOR KIDS
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
SCSC 455 Computer Security Chapter 3 User Security.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Society & Computers PowerPoint
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Setting Up Your New iPad. Turn on Your iPad and then… Select English Select United States Select DVUSD Mobile as your wifi network Select enable location.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Fox Scientific, Inc. ONLINE ORDERING 101. Welcome to our website On our main page you can find current promotions, the vendors we offer, technical references.
How to Enable Account Key Sign Instead Of Password In Yahoo? For more details:
iPhones and iPads and iTunes, Oh My!
Mobile Operating Systems
DATA SECURITY FOR MEDICAL RESEARCH
 Gmail is a free webmail service, developed by Google.  Gmail also supports advertising.  Users can access Gmail on the desktop, laptop or through.
Ways to protect yourself against hackers
Password Management Limit login attempts Encrypt your passwords
Two-factor authentication
Reset Kindle To Factory Settings. (Check Here)
Introduction to Computers
Presentation transcript:

Agenda  Top 12 security recommendations  Google Android specific recommendations  Apple iOS (iPad and iPhone) specific recommendations  General Fermilab comments Official Support Recommendations 12/08/20112

1. Activate the password lock (screen lock) for accessing the device. Please use some sort of unlock process; be it a password, a PIN, or at a minimum, use the simple pattern unlock. 2. Don’t use simple passwords.  While using a Fermi-grade password (complex) is the best for security, remember that virtual keyboards can make entering a complex password more difficult.  Use passwords that cannot be easily guessed (i.e., NOT birthday, anniversary, address, phone number, etc.) Top 12 Security Recommendations 12/08/20113

Top 12 cont. 3. Don’t share your device with others.  The mobile device market is not mature enough to allow for a “multi-user” environment.  Android and Amazon Marketplaces and iTunes can be linked to bank accounts so any users of your device can purchase items without your knowledge.  Any accounts you have synced with your device ( , calendar, Facebook, Twitter, etc.) are accessible to other users. 4. Don’t leave your device unattended.  Mobile devices are easy to set down and lose track of them. Thieves are now actively targeting users with mobile devices. They wait for a user to set down their device and look away. Once they are stolen, they are easy to hide.  Look for applications that may be used to track your device if it is lost or stolen. 12/08/20114

Top 12 cont. 5. Encrypt device, if possible.  Many times the device can be accessed via USB cable or remove of memory cards; even with a device with a decent password lock. Encrypting the device can make that process more difficult to provide anything useful to unauthorized people. 6. Back up the device content regularly.  Devices can be misplaced or stolen so backup your device. This will reduce the hardship of losing a device.  If the device has to be reset to factory or wiped, vendors many times advise data be backed up. 12/08/20115

Top 12 cont. 7. Don’t use the device to store passwords, login information, or personal information.  The loss of a device can be specially disturbing if you store passwords to other accounts (bank, , Fermi systems). Remember, it is against Fermi policy to have Fermi related passwords stored on any device.  While having a list of all your (and family’s) personal information may be convenient, having it on a easily misplaced/stolen device means thieves will have all the information necessary to steal your identity (credit card numbers, social security numbers, birthday). If you feel it is worth the risk, use an encrypted application such as KeePass (256-bit AES). 8. Don't alter device’s default security settings.  Vendors spend a great deal of time researching the optimal settings to secure your devices. Be very careful altering these settings. If you DO change the default settings, please do so by increasing the security. Also realize that increased security may change the performance and battery life of your device.  Some applications may “require” you to change settings. This can open security holes in your devices. Read the fine print to verify this is really necessary and worth tpotentially the reducing security. 12/08/20116

Top 12 cont. 9. Make sure your device is up-to-date. (Operating System & Applications)  Be it Android or Apple; install updates when they become available. These can provide critical security patches and may also provide performance enhancements and new features.  Android and Amazon Marketplaces, and iTunes all notify you when an application you have installed has a patch available. Patches can be vital to keeping the application stable, improve performance, or patch a security hole. 12/08/20117

Top 12 cont. 10. Don’t jailbreak/hack/root your device.  While many might consider modifying the default OS to allow for more freedom or access to features not available with the stock OS, this opens your device to greater access for applications to do things you might not be aware of.  Rooting a device usually voids any warranty the vendor may offer. Many of these devices are offered at a reduced cost for new customers or as part of a contract. If your device breaks and you have to replace it, you may be forced to pay full price for the device ($500+). 11. Be aware of public wireless networks.  The words “free” and “open” should warn you to be cautious. Open and free means no security. All traffic between your device and the wireless access point are not encrypted and could be intercepted. If a service set identifier (SSID) is provided and you are required to enter a password, then odds are you are getting some security. Still be wary of the data you are transmitting. 12/08/20118

Top 12 cont. 12. Use SSL encrypted applications, if possible.  To go along with free and/or open wireless, if you have the option to encrypt transmitted data, do so to help assure your personal data is not intercepted.  and web browsing can be secured using SSL encryption. Web pages that start with are using SSL encryption. This is not foolproof but better than no encryption. 12/08/20119

Google Android Specific  Be careful what you install and what files you open. ○ #1 method of infection can be traced to applications installed from Android Marketplace and applications installed directly from webpages. Android Marketplace is really good at dropping infected applications as soon as they are reported. Do your research before installing applications. ○ Amazon Marketplace and your device/vendor’s custom Marketplace, at this time, are not seeing much, if any, infected applications. This can change so be diligent in your research. ○ #2 method of infection is from files such as PDFs. Use the same caution we ask of you here at Fermilab. Only open files from people you know and when you are expecting the file.  Anti-Virus Application ○ Use reputable vendors and really research the application. “Free” may not be the best. 12/08/201110

 Wipe after 10 failed login attempts ○ This is a good option to enable if you are the only user and really want some extra assurance that no one can steal your data. ○ Backup often just in case it IS wiped. ○ May not be a good idea if around kids because 10 attempts can be used up in about 7.4 seconds by the average 4 year-old.  Anti-Virus Application ○ iOS uses a segregated (sandbox) structure where applications cannot directly interact with each other. This, for now, protects the device for the most part. AV is a fairly new concept in iOS and will be better supported by iOS going forward as will the AV applications will get better over time. ○ Use reputable vendors and really research the application. “Free” may not be the best  Turn off picture frame ○ Nothing worse than having pictures start displaying that you NEVER intended to show everyone. You know what I mean. {wink} Apple iOS Specific 12/08/201111

General Fermilab comments  Service Desk Assistance ○ setup (Exchange) Configuring Exchange will enable the ability for you and Fermi Exchange Admins to remotely wipe your device. ○ Network Registration (MISCOMP)  Technology Store will be offering tablets (iPad & Android) in the near future.  Android and iOS Baselines are in the process of being approved. ○ Lab owned devices will be required to follow baselines requirements. ○ Cloud based storage is prohibited for Fermilab data. Data generated on Fermilab equipment/property must be managed with Fermilab resources Freedom of Information Act Law Enforcement request for information  Report Stolen or lost devices to Security promptly ○ As with any Fermilab owned items, the quicker the item is reported missing the quicker it may be recovered. 12/08/201112

Quote: “The form factor of these devices makes them easy to lose and misplace,” explained Nicholas Arvanitis, principal security consultant at South African IT infrastructure giant Dimension Data. “They're also attractive targets for theft -- consider that most consumers control a lot of their lives from these devices and often store credentials (usernames and passwords) for many services on them.” “Unfortunately, theft or loss of these devices is inevitable,” he added. “The most prudent approach is to configure the device and maintain it with the assumption that at some stage it will be lost or stolen.” 12/08/201113

The End…  Questions? 12/08/ Illustration by Andrew DeGraff