Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.

Slides:



Advertisements
Similar presentations
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Advertisements

Cyber Security on the go
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
HELP US HELP YOU: MAKING YOUR MOBILE DEVICE WORK FOR YOU IT Pro Name Company Name Date Note: Consider having one of your execs present this with you to.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Meraki Mobile Device Management
Protecting Your Identity: What to Know, What to Do.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Introduction to Depository Institutions Presented by Day 2.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Lack of Security in Hotspots/Wi Fi Areas Yin Wai ISM 158 4/27/10.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
HIPAA Data Security PCF Data Security Update May 1 st, 2015.
Certificate Authority Security Council (CASC) 2015 Consumer Trust Survey.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Information Security Information Technology and Computing Services Information Technology and Computing Services
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Securing Information in the Higher Education Office.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
ESCCO Data Security Training David Dixon September 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Co-hosted by Presents Where’s Your Data
Wireless Security: Protect yourself when you’re mobile.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
Josh Dallyn, Technical Advisor – Microsoft Bill Durham, President – Basileia Consulting Group Windows 8: For Business.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Phillip Zerzan, Chief Emergency: 911 or Non-Emergency: Portland State University Campus.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Cyber Security Awareness Month Using Your Laptop Safely On the Road Off-Campus Safe Computing Part 2.
Started using security software on new Dell computers in mid-2004 Currently purchase 3 year licenses for desktop, laptop, and netbook computers Points.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Consumer Protection Shop Safely and Guard Your Financial Information.
Cyber Safety Jamie Salazar.
OIT and IT providers across campus are launching an awareness campaign to provide tips and resources to help you stay safe online and protect AU resources.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
UCL Security are here for your Safety and Protection f But we need your help. Visit Our Website for our Advice on staying safe in and around the UCL Campus.
Mobile Device Security Management Leyna Belinsky.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Traveling Securely. Unsecured Networks and browsing  Using Unsecured Networks –Hotels, airports, coffee shops, libraries, etc Anywhere you do not know.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Activate your McAfee on Support for McAfee
Barracuda Mobile Device Manager
Attention Identity theft Definition
Information Security.
Protecting Your Identity:
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Staying Austin College
Data Protection Scenarios
Digital $$ Quiz Test your knowledge.
UD PCI GUIDELINES A guide for compliance with PCI DSS and the University of Delaware Payment Card Program ALWAYS Process payments immediately using a solution.
Presentation transcript:

Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

Where are we going? A look at common security concerns with mobile devices including laptops Tips to secure your devices and keep your data safe Questions and open discussion

Common Security Concerns Do you know what data is on your device? Sensitive s Sensitive documents Financial information Personal privacy Open and free wireless access

Common Security Concerns Theft Support while traveling Unprotected network connections Nosey applications and features

Tips to stay safe For mobile devices Setup a password or passcode to access device Encrypt your information Don’t store any more information than you need Warning on storing information on internal data cards Keep a close eye on your mobile device

Tips to stay safe Applications and features gone bad Keep an eye on geotagging apps and phone “features” Read the privacy policy. You may be amazed at what you are authorizing the app to collect Free is rarely free.

Tips to stay safe Features to look for when buying Remote delete capability Encryption Password protection Easy to understand

Tips to stay safe Keeping data safe when using Try to keep to cellular data Avoid any sensitive activity over open WiFi Use a VPN client Consider buying a MiFi device or high speed cellular modem for other devices

Tips to stay safe If equipment is lost or stolen Computrace or LoJack for laptops and netbooks Remote delete capabilities Report to mobile company ASAP Contact the police Keep a record of serial numbers and MAC addresses Whole disc encryption

Tips to stay safe Physical security Use a lock on the laptop Never leave unattended Lock in safe Keep doors locked Consider a netbook for travel

Questions & Open Discussion

Thank You