Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

IT Security Assurance Management of Network and User Behavior Budi Rahardjo INDOCISC - ID-CERT -
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Voice over the Internet Protocol (VoIP) Technologies… How to Select a Videoconferencing System for Your Agency Based on the Work of Watzlaf, V.M., Fahima,
For further information computersecurity.wlu.ca
Guanjong High School Group 2. Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Computer Security Workshops Security Introduction, Central Principles and Concepts.
Peter Brudenall & Caroline Evans- Simmons & Simmons Marsh Technology Conference 2005 Zurich, Switzerland. Managing the Security Landscape – Legal and Risk.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Risk Management Vs Risk avoidance William Gillette.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
ESCCO Data Security Training David Dixon September 2014.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Cyber Security & Fraud – The impact on small businesses.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Pro-active Security Measures
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
How Mobile Transforms the Enterprise
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect.
Safe’n’Sec IT security solutions for enterprises of any size.
MIS323 – Business Telecommunications Chapter 10 Security.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Moving to BYOD Gary Audin 1.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
The Benefits of Using Virtual Merchant. EMV cards have been extremely popular in recent times and it’s one of the greatest technological advances in recent.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Welcome to the ICT Department Unit 3_5 Security Policies.
Despite of spending high on digital information security, organizations still remain exposed to external threats. However, data center providers are helping.
BYOD Security Risks Presentation by Ravi Namboori Visit
Is Endpoint security dead?
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
The time to address enterprise mobility is now
Data and database administration
Computer Security Fundamentals
Lecture 14: Business Information Systems - ICT Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Unit 27: Network Operating Systems
Join In Be Secure Presentation
Security Essentials for Small Businesses
Keeping your data, money & reputation safe
Windows 10 Enterprise E3 for Small and Medium Business
Cyber security and Computer Misuse
Presentation transcript:

Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.

Shifting Mobile Landscape-BYOD Environment According to a 2014 survey by Check Point Software Technologies: 93% of employees have mobile devices connected to their network 71% of enterprises believe that the use of personal mobile devices on their networks is leading to increased security incidents 45% of businesses with less than 1000 employees reported mobile security incident costs exceeding $100,000

What Can Be Done? Rather than block access altogether (let’s face it this would never work), companies must learn to embrace the beneficial aspects of the BYOD environment while protecting enterprise data from security threats. This can be done through:  Employee Education  Spreading Awareness of Top Security Risks

Employee Education Existing security training tends to focus around the desktop user because the mobile workforce is still in relative infancy. In order to change this some new policies must be put into place. Education should include:  Information on policies and procedures that are tailored to employee’s specific devices, roles and locations.  Information on who to contact if an employee believes he or she has identified a security threat or risk  Rules for how to best handle confidential information.

Be Aware of Top Threats Many security risks can be dodged using simple common sense. However, being aware of possible risks and taking the necessary precautions to avoid attacks is the best possible way to protect enterprise data. Some Common Risks Include:  Device Loss and Theft: “Maintain the same control over your devices as you would over your credit cards”  Leaky Apps : Implement virus protection and use common sense when clicking through user agreements and purchasing apps in the app store.  Unsafe Network Connectivity and Online Behavior: Ideally only connect to enterprise resources through a corporate firewall. Unsecured Wireless networks make devices more vulnerable to attack and could put an entire organization’s network at risk.