Mobile Device Management - Bring Your Own Device

Preview:

DESCRIPTION

Using the help of Cristiano Ronaldo, This slideshow aims to explains the 5 key risks associated with bringing your own device (BYOD) to the workplace, and Mobile Device Management.

Citation preview

MOBILE DEVICES in theWORKPLACE:

5 Key Security

5 Key Security

Risks:Risks:

meet CRISTIAN

O

CRISTIANO is a business man

…and a trivia man

Hey Cristiano,

DID YOU

KNOW…

…in 2011, Dubliners left thousands of personal items in taxis such as …

a set of FALSE TEETH

two DOGS

one CAT

a few TOILET SEATS

funeral ASHES

and a BABY

Oh! And I

almost forgot. .

.

25,000 MOBILE PHONES

And that’s just in DUBLIN

Many of those lost devices can store:

10K PHOTOS

20K WORD DOCS

200K

EMAILS

500K CONTACTS

That’s a lot of SENSITIVE INFO!

Cristiano, Imagine if YOUR PHONE landed in the wrong

hands?

Just think about how much CORPORATE DATA would be at risk?

CRISTIANO’S Confidential Client Info..

And physical access is just one type of SECURITY THREAT!

Wait, there are more?

Sadly, YES. In fact there are 5 KEY SECURITY RISKS everyone must know.

Communication Interception

Look Familiar?

Think back, when was the last time you accessed a Wi-Fi hot spot?

Hmm, where was I?

For companies with employees who use Wi-Fi

hotspots

… the stakes are high!

Malicious Code

Malware attacks are no longer confined to PCs!

In fact, mobile malware threats are on the rise…

..and continue to affect the

most prevalent mobile

operating systems

Here’s an interesting fact for you Cristiano, in 2011…

Before

After

Wow that’s

shocking!

Device Attacks

Device attacks are typically designed to gain control of the device and access content…

…or attempt a denial of service (DOS).

DEVICE ATTACKS are similar to PC ATTACKS of the past, such as…

Browser-based attacks

Buffer overflow expectations

Application-based attacks

Physical

Access

Cristiano, aren’t Mobile Devices the perfect travel companion?

I mean they are…

small

portable

and lightweight.

But that also means, they are…

1. Easy to steal.

2. Leave behind.

Oh , and remember

this slide?

25,000 MOBILE

PHONES left in

taxis in Dublin

alone!

Ah, I see what

you did there.

You clever

dog.

Insider Threats

Threats can also come from within your organisation.

Malicious insiders can use mobile devices to

leak important

data.

Sharing corporate information from a smartphone will..

..often circumvent

robust monitoring systems, like Data Loss Prevention.

Really?

Seriously?

Yes Cristiano, REALLY!

Lets review the 5

Key Security

Risks one more

time.

Whether or not your company has formally

adopted mobile devices…

They are in your enterprise.

So what should YOU do?

Phone: 01 244 9590

Email: nlanigan@vei.ie

Tweet: @VEIreland

Voice Engineer Ireland

Sounds

good to me.