Presentation is loading. Please wait.

Presentation is loading. Please wait.

© EIT, Author Gay Robertson, 2017

Similar presentations


Presentation on theme: "© EIT, Author Gay Robertson, 2017"— Presentation transcript:

1 © EIT, Author Gay Robertson, 2017
Mobile Security © EIT, Author Gay Robertson, 2017

2 Why is mobile security important?
Mobile devices are everywhere. We use them for both personal use and work use These devices are like desktop computers, only smaller. They hold data, run software, browse websites, take photos and store both personal and company information As they are mini computers, the carry the same security risks as computers and laptops. However mobile phones and tablets are used more and far easier to be lost or stolen then a big desktop, and the fact that we use these devices more and on a more personal level, security becomes more important

3 Physical security One of the biggest risks to smaller mobile devices is that the small size and nature of the devices means they are far easier to be picked up and stolen, or lost by being left at a bus stop, left at a café or simply falling out of a pocket Most of us would hope that someone who found the device would turn it in or aim to return it to the owner, however this is not always the case It is important to be aware that it not just the device that is gone, but the data on the device as well

4 Personal Security Risks
On a personal device this might mean your photos, unless backed up, might be lost forever If you have social media apps open anyone will be able to access that social media through your phone Also any sensitive information such as your contacts, and any saved files are also at risk of being lost or stolen Worse case being a thief can use the information on your phone to impersonate you, can access your accounts including and social media, or worse, can access your bank account information

5 Company Security Risks
Work phones also become a huge liability for organisations. s and files that hold sensitive or confidential information can be a gold mine to illegal users They could be used to damage the reputation of the organisation by using to spam clients This information may be used to blackmail the organisation into returning the device. Or potentially sold to a competing company or made public Sometimes organisation information being leaked to public or competitors can have a huge impact. Either for the nature of the information leaked or that the image of the company is lowered due to it be known for having security breaches

6 Physical Security Measures
One of the most common security measures is to have a pin or passcode required to open your device. This may not be entirely secure but it does stop others from immediately being able to access your device Today smartphones are beginning to implement finger scanners as another form of security - the argument being that requiring a fingerprint scan is a far more secure measure then using a four digit pin or pattern Most mobile devices - both apple and android - have tracking functions where the device can be tracked or located if missing. Additionally these tracking apps have the ability to lock your device or delete content on the device

7 When using a company mobile device it is essential to communicate the disappearance of the device quickly. Most companies have this listed in the user policy An organisation’s IT department will then look to track the device, to erase all data and disable the device if possible via a security application Alternatively it is important that the potential of information being lost or stolen is communicated to the company. The company can then investigate what data was on the device and the potential implications this has on the organisation

8 Application Security Applications are software that can be downloaded onto mobile devices such as smartphones or tablets Much like some computer programs, some applications are not what they seem - they may hold malicious software or spyware that can infect your device and damage or steal information It is important to ask the question if the app you are downloading is safe or has the potential to cause harm to your device

9 One of the best things is to ensure any apps you download are from an official store such as Google play or Amazon for Android devices, or the Apple store for Apple devices These stores run screening to try and pick up on any malicious or suspicious programs before being available on their store Downloading an app from a non-official website or source, particularly programs that usually cost but are being offered for free, generally have a higher chance of being not what they seem and can hold malicious software Another thing is to check the reviews on an application and not just the star rating - there have been cases of software where the user has to give the app a high rating to be able to close or exit the malicious application

10 Application Permissions
When you install an application through an application store, the apps need to request permission to access information on parts of your phone - this permission feature is an attempt to protect your device However most users don’t read the permissions carefully and this can lead to security flaws For example if a free card game requests permission to access your camera and photos, you have to ask the question why does this card game need access to these parts of your phone? Is it a additional function of the game where the camera can be used? This should be explained in the description. Or is there hidden spyware or something else going on in the background of the application Do you trust this app or decide on another Read permissions carefully and always think before you install applications

11 Data Security Data on devices is also at risk. Data may be intercepted if of interest to another, or lost if your device is damaged or goes missing It is important that any data on you device is backed up, either via a cloud application or a computer. If you take photos and don’t back them up then those images could be lost forever. This goes for any other files or documents stored on the device Another factor when it comes to company information is ensuring that any information that is not essential to have on the device is not stored on the device. The less stored the less there is to risk losing More organisations are implementing cloud systems where an employee may edit files or data on the cloud, but discourage users downloading files and data onto the phone or tablet’s storage It is important that a username and password is required to access the cloud storage as this can help stop others accessing the device if the phone is taken

12 Network Securty Another factor is what network your device is connected to, for example, connecting to public network such as free Wi-Fi at a mall or supermarket can lead to higher risks of another user tapping into your information It is worth being aware what you are accessing and sharing while on public networks Encryption is another way to ensure data traveling to and from your device is secure

13 Videos to watch: Mobile Security - Duration 3m 25s As mobile technology becomes more advanced, so do the security attacks of those who want to exploit mobile technology, creating a multitude of troubling scenarios. Built on IBM’s unique threat intelligence platform, the Mobile Security Framework automatically fuses context and risk awareness into each security imperative, to maximize mobility management and security effectiveness.  

14 Creating a strong password - Duration 3m 30s Passwords are an essential part of life online - and if we're not careful about keeping them secret, they can cause big problems. By understanding the risks and making passwords stronger, we can feel a little more secure.

15 What is hacking? - Duration 3m 8s Hackers may not be who we think they are. In fact, you might be a hacker and not even know it. Learn the true meaning of hacking and some of the many reasons that hackers hack.

16 Android Virus Protection - Duration 3m 1s How well do you know the app you're about to download? Ensure Android virus and malicious app protection from ESET Mobile Security for Android. 

17 Additional information on Internet Security Staying safe online is essential in today's world. Learn all about online safety and get Internet safety tips in this free tutorial.

18 Okay, let’s go use the workbook


Download ppt "© EIT, Author Gay Robertson, 2017"

Similar presentations


Ads by Google