MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Why Comply with PCI Security Standards?
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
New Data Regulation Law 201 CMR TJX Video.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
ESCCO Data Security Training David Dixon September 2014.
BUSINESS B1 Information Security.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
Wireless Security: Protect yourself when you’re mobile.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Topic 5: Basic Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Security Keeping you and your computer safe in the digital world.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Chapter 40 Internet Security.
Information Security.
Information Security 101 Richard Davis, Rob Laltrello.
Topic 6: Issues Press F5 to view!
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Staying Austin College
Securing Information Systems
© EIT, Author Gay Robertson, 2017
Risk of the Internet At Home
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
Understanding Browsers
How to keep the bad guys out and your data safe
Internet Safety – Social Media
G061 - Network Security.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

MOBILE DEVICE SECURITY

WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld Game Consoles (PS3 or PS Vita)  Personal Digital Assistant (PDA) Mobile Device Protections  Passwords/lock codes  Encryption  Security Software  Software updates

STATISTICS AND FACTS ON MOBILE DEVICE SECURITY  The Government Accountability Office says that the number of variants of malicious software aimed at mobile devices has risen by 185% in less than a year  The Government Accountability Office says that Mobile devices face a wide variety of threats that take advantage of numerous vulnerabilities commonly found in such devices.  This shows the amount of risk that is involved with mobile device use and privacy and how fast it is developing.

PREVALENT ISSUES OF MOBILE DEVICE SECURITY  Disabled Passwords  Unencrypted Wireless Transmissions  Not using a password and using unencrypted wireless transmissions makes it that much easier for an outsider to intercept sensitive data

OTHER IMPORTANT ISSUES  Not using security software  Malware, a significant risk  Not using security software makes malware a risk

RISKS OF NOT BEING UP TO DATE  Out of date operating system  Out of date software  Easier access for attackers

SUGGESTION FOR PROTECTION  Enable password functions  Install anti malware software  Be sure to keep up with security updates and download them  Use Encryption

ISSUES WITH IN BUSINESS

Graph from Webroot: Survey:Mobile Threats are Real and Costly p.5

Graph from Webroot: Survey:Mobile Threats are Real and Costly p.6

MYTHS ABOUT THE USE OF MOBILE DEVICES  Mobile devices do not store corporate data.  Strong passwords, PINs, or authentication schemes are enough to prevent unauthorized access.  Public Wi-Fi is still safe when using devices outside of the company.

STEPS THAT CAN REDUCE COSTS  Training  Policies  Security

MOBILE DEVICE SECURITY IN HIGHER EDUCATION

WI-FI  A common and perhaps the most major issue among mobile device security is students use of Wi-Fi on campus. Whether using the schools internet connection or the Wi-fi of a surrounding starbucks, etc. It is almost impossible to be sure that the connection is 100% secure. By trusting any connection, we are making ourselves as students vulnerable to those around us gaining access to anything we do on our mobile devices.  This could include any thing from mobile banking, to online payments for bills, school, etc, or just the login information for personal accounts for things such as school

SOCIAL MEDIA  Our social media presence is another major issue for mobile device security.  Although we view it as something fun and harmless, the personal information we post, such as our school, the people we hangout with, and the things we like could be the very thing to make us targets for hackers  Hackers use this info to create personal attacks that make their messages seem more trustworthy

INSTITUTIONS FAILURE TO VERIFY USERS  Many institutions fail to verify that all users using their connections and platforms are safe and will provide a secure area for all of their other users.  Failure to do so by the schools presents what seems to be a trustworthy connection to students, in all actuality, a place for hackers to easily have access to thousands of students personal info.

SOLUTIONS  Never use a Wi-Fi connection unless you are 100% sure it is secure or it is your own personal home connection  Never over share information about your life on social media, always verify the validity of users when confirming friend requests, and never open a link unless the sender is 100% trustworthy.  When using a schools connection always enable all locks and security options on your mobile device and never access info that could be potentially harmful if it got out.

CONCLUSION

EXISTING PROBLEMS AND HOW TO SOLVE THEM  choose a password that will not easily be detected  install some anti malware software to avoid viruses, trojans, and spyware  install a firewall and security updates, and using encryption for stored data

DIFFERENT AREAS OF BUSINESS WHERE MOBILE DEVICE SECURITY MAY AFFECT THE BUSINESS  malware threats  lost or stolen devices  reduced productivity  increased help desk time to repair damage  additional resources needed to manage mobile security  disrupted business activity  the loss of company or consumer data

FOLLOWING SOLUTIONS FOR BUSINESS  have device management security in place  companies should implement mobile security that includes three key solutions: policies, device-level security and training

ISSUES IN HIGHER EDUCATION  Wi-Fi  Social media  Ensuring that all users on a specific network are complying the rules and regulations of that network

SOLUTIONS FOR HIGHER EDUCATION  Stay off of Wi-Fi; if you are not using a network, then keep your Wi-Fi cut off and therefore the students around you cannot hack into your device  Keep anything private about yourself off of social media  Have your own Wi-Fi network on your device that is only accessed by using a password

PROTECT YOURSELF!!!