12
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

Beyond WiFi: Securing Your Mobile Devices

Thomas KuhnInformation Technology Assistance Center (iTAC)

Kansas State University

Page 2: Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

Where are we going?

• A look at common security concerns with mobile devices including laptops

• Tips to secure your devices and keep your data safe

• Questions and open discussion

Page 3: Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

Common Security Concerns

• Do you know what data is on your device?

• Sensitive emails

• Sensitive documents

• Financial information

• Personal privacy

• Open and free wireless access

Page 4: Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

Common Security Concerns

• Theft

• Support while traveling

• Unprotected network connections

• Nosey applications and features

Page 5: Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

Tips to stay safe• For mobile devices

• Setup a password or passcode to access device

• Encrypt your information

• Don’t store any more information than you need

• Warning on storing information on internal data cards

• Keep a close eye on your mobile device

Page 6: Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

Tips to stay safe

• Applications and features gone bad

• Keep an eye on geotagging apps and phone “features”

• Read the privacy policy. You may be amazed at what you are authorizing the app to collect

• Free is rarely free.

Page 7: Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

Tips to stay safe

• Features to look for when buying

• Remote delete capability

• Encryption

• Password protection

• Easy to understand

Page 8: Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

Tips to stay safe• Keeping data safe when using

• Try to keep to cellular data

• Avoid any sensitive activity over open WiFi

• Use a VPN client

• Consider buying a MiFi device or high speed cellular modem for other devices

Page 9: Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

Tips to stay safe• If equipment is lost or stolen

• Computrace or LoJack for laptops and netbooks

• Remote delete capabilities

• Report to mobile company ASAP

• Contact the police

• Keep a record of serial numbers and MAC addresses

• Whole disc encryption

Page 10: Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

Tips to stay safe• Physical security

• Use a lock on the laptop

• Never leave unattended

• Lock in safe

• Keep doors locked

• Consider a netbook for travel

Page 11: Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

Questions & Open Discussion

Page 12: Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University

Thank You