technology workshop going mobile! - ekaruand secure with mobile devices. we’ll wrap up before 1pm....

Post on 13-Aug-2020

2 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Technology Workshop

Going Mobile!

November 15, 2012

Copyright 2012. Ekaru, LLC. 2

Welcome!

Thank you for joining us today.

In today’s call we will cover a few tips and tricks to help you get more efficient and secure with mobile devices. We’ll wrap up before 1pm.

If you want to follow from your office, go to www.ekaru.com / Go to “What’s New” near the bottom of the page. Presentation will open in a browser, click the down arrow in nav bar to advance slides.

Copyright 2012. Ekaru, LLC. 3

Format

Given the number of people on the line today, this is a “listen only” call. (Reason, cut down on ambient noise, avoid

“call on hold music” – a bit tough though, because I can’t hear you!)

If you have questions, please eMail to info@ekaru.com and we will try to include Q&A at the end of the call – we will be reviewing email live during the call.

Call 978-692-4200 for help.

Copyright 2012. Ekaru, LLC. 4 4

Workshop Mission

Help you get more from the technology you already have.

Introduce you to new technologies you need to know about.

Going Mobile!

Copyright 2012. Ekaru, LLC. 5

BYOD

Bring your own device (BYOD) is a business policy of employees bringing personally owned mobile devices to their place of work and using those devices to access privileged company resources such as email, file servers and databases as well as their personal applications and data

Copyright 2012. Ekaru, LLC. 6

Where is your information?

Where is your company information?

What data is entering and leaving your network every day?

Copyright 2012. Ekaru, LLC. 7

BCBS Data Breach 2010

BCBS employee took home a spreadsheet on a laptop to work on it after hours.

The laptop was stolen from a car No one knew exactly what was on the laptop.

Several weeks later, they realized that personal information for just about all BCBS Physicians nationwide were on the laptop

The laptop was NOT encrypted. 39,000 MA physicians notified of breach at

BCBS (estimate 850,000 nationwide!) Long delay to notify physicians

Copyright 2012. Ekaru, LLC. 8

Threats to Business

Copyright 2012. Ekaru, LLC. 9

Kaspersky Lab & B2B International

Preventative Measures

Copyright 2012. Ekaru, LLC. 10

Security Statistics

33% of companies allow their staff unrestricted access to corporate resources from their smartphones.

10% of respondents said they had experienced critical information leaks due to the loss or theft of a mobile device.

Only 9% plan to introduce tough restrictions.

- B2B International in July 2012.

Copyright 2012. Ekaru, LLC. 11

Balance

Convenience vs Security

Copyright 2012. Ekaru, LLC. 12

Two major concerns

What is entering your network?

What is leaving your network?

Copyright 2012. Ekaru, LLC. 13

Mobile Security

Legal Requirements

Protect your Business

Copyright 2012. Ekaru, LLC. 14

15

MA Data Security Law

Law went into effect 2010

Applies to “Personal Information” for MA residents

* Personal Information = (First name or initial)+ last name + (SSN or Financial Account Number or Drivers License, etc).

Copyright 2012. Ekaru, LLC.

Security with public WI-FI

Router that connects to Internet has a firewall to protect users from outsiders

BUT, on a local network, you are basically trusting everyone there unless you use precautions.

16 © 2012 Ekaru,

LLC

Set your security to “Public Network”

To see what your current settings are and to change them, go to Control Panel, Network & Sharing Center. For a Public Network, the icon is a Park Bench. To see the individual settings, click on "Change Advanced Sharing Settings".

17 © 2012 Ekaru,

LLC

Public Security Settings

18 © 2012 Ekaru,

LLC

Public Security Settings

1) Turn off Network Discovery - When Network Discovery is ON, your computer can see other computers and devices on the network and they can see you.

2) Turn off File and Printer Sharing - When File and Printer Sharing is ON, files and printers you have shared on this computer can be access by other people on the network.

3) Turn off Public Folder Sharing - When public Folder Sharing is ON, people on the network can access Public Folders.

4) Turn on Password Protected Sharing - if you are going to share files and folders, make sure Password Protected Sharing is ON so that only users with a user name and password for your system could access the files.

5) Additionally, Turn ON Windows Firewall. Go to Control Panel, Windows Firewall and check that its ON. The firewall helps prevent other systems on the network (all the people you don't know in the coffee shop) from potentially spreading malicious software or accessing your system.

6) When accessing web sites, look for SSL encryption to make sure your transmissions are protected. Look for "HTTPS" in the web address.

19

© 2012 Ekaru, LLC

Turn of Wireless if you don’t need it!

Hit “Windows Key” + X – Lots of on/off switches

20 © 2012 Ekaru,

LLC

MA Data Security Law - 4

“Encryption of all transmitted records and files containing personal information that will travel across public networks, and encryption of all data containing personal information to be transmitted wirelessly.”

Copyright 2012. Ekaru, LLC. 21

MA Data Security Law - 5

Encryption of all personal information stored on laptops or other portable devices

Laptops

Smartphones

Portable Hard Drives

USB “Thumb” Drives

Copyright 2012. Ekaru, LLC. 22

Laptop

Full Disk Encryption

We recommend

PGP and

TrueCrypt (Open Source)

Self encrypting drives

DO NOT FORGET YOUR PASSPHRASE

Copyright 2012. Ekaru, LLC. 23

Copyright 2012. Ekaru, LLC. 24

iPhone Security

PIN Lock

Option to wipe after 10 failed attempts

“Find my iPhone” If you misplace your iPhone, iPad, iPod touch, or Mac, the Find My iPhone app will let you use another iOS device to find it and protect your data. Simply install this free app on another iOS device, open it, and sign in with your Apple ID. Find My iPhone will help you locate your missing device on a map, play a sound, display a message, remotely lock

Keep OS updated

Encrypt a SmartPhone

Examples from PCWorld

WhisperCore

DroidCrypt

AnDisk Encryption

Files / Folders / Images

What files should be allowed?

Watch billing statements – common malware is to send “premium” texts

Copyright 2012. Ekaru, LLC. 25

MA Data Security Law - 6

“For files containing personal information on a system that is connected to the Internet, there must be reasonably up-to-date firewall protection and operating system security patches, reasonably designed to maintain the integrity of the personal information.”

Copyright 2012. Ekaru, LLC. 26

Security with public WI-FI

Router that connects to Internet has a firewall to protect users from outsiders

BUT, on a local network, you are basically trusting everyone there unless you use precautions.

27 © 2012 Ekaru,

LLC

Set your security to “Public Network”

To see what your current settings are and to change them, go to Control Panel, Network & Sharing Center. For a Public Network, the icon is a Park Bench. To see the individual settings, click on "Change Advanced Sharing Settings".

28 © 2012 Ekaru,

LLC

Public Security Settings

29 © 2012 Ekaru,

LLC

Public Security Settings

1) Turn off Network Discovery - When Network Discovery is ON, your computer can see other computers and devices on the network and they can see you.

2) Turn off File and Printer Sharing - When File and Printer Sharing is ON, files and printers you have shared on this computer can be access by other people on the network.

3) Turn off Public Folder Sharing - When public Folder Sharing is ON, people on the network can access Public Folders.

4) Turn on Password Protected Sharing - if you are going to share files and folders, make sure Password Protected Sharing is ON so that only users with a user name and password for your system could access the files.

5) Additionally, Turn ON Windows Firewall. Go to Control Panel, Windows Firewall and check that its ON. The firewall helps prevent other systems on the network (all the people you don't know in the coffee shop) from potentially spreading malicious software or accessing your system.

6) When accessing web sites, look for SSL encryption to make sure your transmissions are protected. Look for "HTTPS" in the web address.

30

© 2012 Ekaru, LLC

Turn of Wireless if you don’t need it!

Hit “Windows Key” + X – Lots of on/off switches

31 © 2012 Ekaru,

LLC

MA Data Security Law - 7

”Reasonably up-to-date versions of system security agent software which must include malware protection and reasonably up-to-date patches and virus definitions, or a version of such software that can still be supported with up-to-date patches and virus definitions, and is set to receive the most current security updates on a regular basis.”

Copyright 2012. Ekaru, LLC. 32

Android Market Malware

Many reports of malware

Google put in scanners, but still some stuff getting through.

Impact of devices on company network?

Copyright 2012. Ekaru, LLC. 33

Watch for Phishing emails

You can click on a bad link to get malware

Many “fake” emails from Verizon, JetBlue, ATT, UPS, etc.

Consider perimeter security

Smart phones connecting via Wireless, not 3G, 4G

Copyright 2012. Ekaru, LLC. 34

MA Data Security Law - 8

“Education and training of employees on the proper use of the computer security system and the importance of personal information security.”

People generally “break the rules” for convenience. Education is key!

Copyright 2012. Ekaru, LLC. 35

Employee Training

Educate

Establish Clear Rules

Things to think about:

Installing company email on smart phones

Policies about bringing devices onto work network

What files can leave the building?

Copyright 2012. Ekaru, LLC. 36

MDM – Mobile Device Management

December 2012, Q1 2013

Managed Service Clients: End-to-end MDM that simplifies the entire lifecycle - from

device provisioning, security, monitoring, and reporting to app distribution and document sharing - all through a single, comprehensive platform

BYOD support

includes standard security services such as remote device lock and password enforcement,

ability to selectively wipe corporate data, automate procedures for lost devices, prevent data leaks, detect and restrict jail-broken and rooted devices.

Copyright 2012. Ekaru, LLC. 37

Synchronization - Exchange

Exchange Mail

Local – Server on site

Cloud (“hosted”)

Mix and match regular and Exchange hosted mailboxes

Solution is fully designed for synchronization.

Copyright 2012. Ekaru, LLC. 38

Copyright 2012. Ekaru, LLC. 39 39

Thank You!:

For more information:

Ekaru Connecting People with Technology

978-692-4200

www.ekaru.com

Sign up for Ekaru’s free Technology Advisor e-newsletter

Next webinar: Replay of Microsoft Outlook Tips and Tricks…

top related