16
Mobile Device Security Training Austin Polley Information Technology Assistance Center (iTAC) Kansas State University

mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

  • Upload
    vokien

  • View
    223

  • Download
    6

Embed Size (px)

Citation preview

Page 1: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

Mobile Device Security Training

Austin PolleyInformation Technology Assistance Center (iTAC)

Kansas State University

Page 2: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

Why Focus on Mobile DeviceWhy Focus on Mobile Device Security?y

• Idea of being just a “phone”g j p

• Smaller size

• Increased mobility

• Increased functionality

• Value

Page 3: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

Wh i ?Where are we going?• A look at common security concerns with mobile

devicesdevices

• Tips to secure your devices and keep your data safep y p y

• What to do when security is compromised

• Questions and open discussion

Page 4: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

S it CSecurity Concerns

Physical Access• Physical Access

• Staying safe while using deviceStaying safe while using device

• What to do before/after you lose your phone

Page 5: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

Ph i l APhysical Access

• Always keep track of your mobile device

• Never leave it unattended for any amount of time

• Don’t leave it in the care of others

• When storing your device, you can never be too safe

St i l k d bi t d i ffi• Store in locked cabinet or drawer in office

Page 6: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

Ph i l APhysical Access• Check what security settings your device has

Pi b d i tt l k• Pin number, password, swipe pattern unlock features

• Wipe phone after x amount of failed login attempts

• Belt clips can be problematic, carry it securely

• Choose to leave phone at home when you don’t need it

Page 7: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

Staying safe while usingStaying safe while using device

• Avoid public or open WIFI hotspots• Avoid public or open WIFI hotspots.

• Use mobile data connection: tethering, mobile hotspot g, petc

• Use a VPN Client

Turn off unnecessary features• Turn off unnecessary features

Page 8: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

Staying safe while usingStaying safe while using device

• Only keep the files you need

• Virtual Credit Card Numbers

• Reporting location in social networks can be dangerous

Page 9: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

Malicious contentMalicious content• Newer threat especially to Android Devices• Newer threat, especially to Android Devices

• Apps collect user data, spam contact list, etcApps collect user data, spam contact list, etc

• Read about the developer, read reviews, don’t assume anything

R d P i i b f i t lli A k t• Read Permissions before installing, App markets can be open and vulnerable.

• Don’t allow apps from unknown sources, 3rd party AppstoresAppstores.

Page 10: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training
Page 11: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

M li i t tMalicious content

• What’s the answer to android viruses?

• Android antiviruses of course!

• Many Popular AVs now have an android version

Page 12: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

P t ti MPreventative Measures• Making preventative steps is the only way…

• Smartphones have find my phone, remote wipe, remote lock, remote “scream” abilities. Many 3rd party options

Varies for each device learn what yours is capable• Varies for each device, learn what yours is capable of

• Find the solution that you think will work best for you and test it.

Page 13: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

P t ti MPreventative Measures

• Encryptionyp

• Not all devices have it, even less have it as a built in function and even fewer than that implement it well.

Blackberry is known for good encryption• Blackberry is known for good encryption

• Reports that iphone encryption is poor, almost noReports that iphone encryption is poor, almost no encryption on android. Possibility for this to change.

Page 14: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

If your device is lost or stolenIf your device is lost or stolen• Use any systems you had in place to:• Use any systems you had in place to:

• Find your phone, make sure it didn’t just get left at y p , j gwork

• If its been stolen, remote wipe it if you can

Device has to have some type of connection to• Device has to have some type of connection to receive commands.

• Contact Law enforcement and cell carrier.

Page 15: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

Q ti & O Di iQuestions & Open Discussion

Page 16: mobile device security training 2011.ppt - k-state.edu€¢ Newer threat especially to Android DevicesNewer threat, especially to Android Devices ... mobile device security training

Th k YThank You