66
MOBILE DEVICES in the WORKPLACE: 5 Key Security 5 Key Security Risks: Risks:

Mobile Device Management - Bring Your Own Device

Embed Size (px)

DESCRIPTION

Using the help of Cristiano Ronaldo, This slideshow aims to explains the 5 key risks associated with bringing your own device (BYOD) to the workplace, and Mobile Device Management.

Citation preview

Page 1: Mobile Device Management - Bring Your Own Device

MOBILE DEVICES in theWORKPLACE:

5 Key Security

5 Key Security

Risks:Risks:

Page 2: Mobile Device Management - Bring Your Own Device

meet CRISTIAN

O

Page 3: Mobile Device Management - Bring Your Own Device

CRISTIANO is a business man

Page 4: Mobile Device Management - Bring Your Own Device

…and a trivia man

Page 5: Mobile Device Management - Bring Your Own Device

Hey Cristiano,

DID YOU

KNOW…

Page 6: Mobile Device Management - Bring Your Own Device

…in 2011, Dubliners left thousands of personal items in taxis such as …

Page 7: Mobile Device Management - Bring Your Own Device

a set of FALSE TEETH

Page 8: Mobile Device Management - Bring Your Own Device

two DOGS

Page 9: Mobile Device Management - Bring Your Own Device

one CAT

Page 10: Mobile Device Management - Bring Your Own Device

a few TOILET SEATS

Page 11: Mobile Device Management - Bring Your Own Device

funeral ASHES

Page 12: Mobile Device Management - Bring Your Own Device

and a BABY

Page 13: Mobile Device Management - Bring Your Own Device

Oh! And I

almost forgot. .

.

Page 14: Mobile Device Management - Bring Your Own Device

25,000 MOBILE PHONES

Page 15: Mobile Device Management - Bring Your Own Device

And that’s just in DUBLIN

Page 16: Mobile Device Management - Bring Your Own Device

Many of those lost devices can store:

10K PHOTOS

20K WORD DOCS

200K

EMAILS

500K CONTACTS

Page 17: Mobile Device Management - Bring Your Own Device

That’s a lot of SENSITIVE INFO!

Page 18: Mobile Device Management - Bring Your Own Device

Cristiano, Imagine if YOUR PHONE landed in the wrong

hands?

Page 19: Mobile Device Management - Bring Your Own Device

Just think about how much CORPORATE DATA would be at risk?

Page 20: Mobile Device Management - Bring Your Own Device

CRISTIANO’S Confidential Client Info..

Page 21: Mobile Device Management - Bring Your Own Device

And physical access is just one type of SECURITY THREAT!

Page 22: Mobile Device Management - Bring Your Own Device

Wait, there are more?

Page 23: Mobile Device Management - Bring Your Own Device

Sadly, YES. In fact there are 5 KEY SECURITY RISKS everyone must know.

Page 24: Mobile Device Management - Bring Your Own Device

Communication Interception

Page 25: Mobile Device Management - Bring Your Own Device

Look Familiar?

Page 26: Mobile Device Management - Bring Your Own Device

Think back, when was the last time you accessed a Wi-Fi hot spot?

Page 27: Mobile Device Management - Bring Your Own Device

Hmm, where was I?

Page 28: Mobile Device Management - Bring Your Own Device

For companies with employees who use Wi-Fi

hotspots

… the stakes are high!

Page 29: Mobile Device Management - Bring Your Own Device

Malicious Code

Page 30: Mobile Device Management - Bring Your Own Device

Malware attacks are no longer confined to PCs!

Page 31: Mobile Device Management - Bring Your Own Device

In fact, mobile malware threats are on the rise…

Page 32: Mobile Device Management - Bring Your Own Device

..and continue to affect the

most prevalent mobile

operating systems

Page 33: Mobile Device Management - Bring Your Own Device

Here’s an interesting fact for you Cristiano, in 2011…

Page 34: Mobile Device Management - Bring Your Own Device
Page 35: Mobile Device Management - Bring Your Own Device

Before

Page 36: Mobile Device Management - Bring Your Own Device

After

Page 37: Mobile Device Management - Bring Your Own Device

Wow that’s

shocking!

Page 38: Mobile Device Management - Bring Your Own Device

Device Attacks

Page 39: Mobile Device Management - Bring Your Own Device

Device attacks are typically designed to gain control of the device and access content…

Page 40: Mobile Device Management - Bring Your Own Device

…or attempt a denial of service (DOS).

Page 41: Mobile Device Management - Bring Your Own Device

DEVICE ATTACKS are similar to PC ATTACKS of the past, such as…

Page 42: Mobile Device Management - Bring Your Own Device

Browser-based attacks

Buffer overflow expectations

Application-based attacks

Page 43: Mobile Device Management - Bring Your Own Device

Physical

Access

Page 44: Mobile Device Management - Bring Your Own Device

Cristiano, aren’t Mobile Devices the perfect travel companion?

Page 45: Mobile Device Management - Bring Your Own Device

I mean they are…

Page 46: Mobile Device Management - Bring Your Own Device

small

Page 47: Mobile Device Management - Bring Your Own Device

portable

Page 48: Mobile Device Management - Bring Your Own Device

and lightweight.

Page 49: Mobile Device Management - Bring Your Own Device

But that also means, they are…

1. Easy to steal.

2. Leave behind.

Page 50: Mobile Device Management - Bring Your Own Device

Oh , and remember

this slide?

Page 51: Mobile Device Management - Bring Your Own Device

25,000 MOBILE

PHONES left in

taxis in Dublin

alone!

Page 52: Mobile Device Management - Bring Your Own Device

Ah, I see what

you did there.

You clever

dog.

Page 53: Mobile Device Management - Bring Your Own Device

Insider Threats

Page 54: Mobile Device Management - Bring Your Own Device

Threats can also come from within your organisation.

Page 55: Mobile Device Management - Bring Your Own Device

Malicious insiders can use mobile devices to

leak important

data.

Page 56: Mobile Device Management - Bring Your Own Device

Sharing corporate information from a smartphone will..

Page 57: Mobile Device Management - Bring Your Own Device

..often circumvent

robust monitoring systems, like Data Loss Prevention.

Page 58: Mobile Device Management - Bring Your Own Device

Really?

Seriously?

Page 59: Mobile Device Management - Bring Your Own Device

Yes Cristiano, REALLY!

Page 60: Mobile Device Management - Bring Your Own Device

Lets review the 5

Key Security

Risks one more

time.

Page 61: Mobile Device Management - Bring Your Own Device
Page 62: Mobile Device Management - Bring Your Own Device

Whether or not your company has formally

adopted mobile devices…

Page 63: Mobile Device Management - Bring Your Own Device

They are in your enterprise.

Page 64: Mobile Device Management - Bring Your Own Device

So what should YOU do?

Page 65: Mobile Device Management - Bring Your Own Device

Phone: 01 244 9590

Email: [email protected]

Tweet: @VEIreland

Voice Engineer Ireland

Page 66: Mobile Device Management - Bring Your Own Device

Sounds

good to me.