mobile device management - bring your own device
DESCRIPTION
Using the help of Cristiano Ronaldo, This slideshow aims to explains the 5 key risks associated with bringing your own device (BYOD) to the workplace, and Mobile Device Management.TRANSCRIPT
MOBILE DEVICES in theWORKPLACE:
5 Key Security
5 Key Security
Risks:Risks:
meet CRISTIAN
O
CRISTIANO is a business man
…and a trivia man
Hey Cristiano,
DID YOU
KNOW…
…in 2011, Dubliners left thousands of personal items in taxis such as …
a set of FALSE TEETH
two DOGS
one CAT
a few TOILET SEATS
funeral ASHES
and a BABY
Oh! And I
almost forgot. .
.
25,000 MOBILE PHONES
And that’s just in DUBLIN
Many of those lost devices can store:
10K PHOTOS
20K WORD DOCS
200K
EMAILS
500K CONTACTS
That’s a lot of SENSITIVE INFO!
Cristiano, Imagine if YOUR PHONE landed in the wrong
hands?
Just think about how much CORPORATE DATA would be at risk?
CRISTIANO’S Confidential Client Info..
And physical access is just one type of SECURITY THREAT!
Wait, there are more?
Sadly, YES. In fact there are 5 KEY SECURITY RISKS everyone must know.
Communication Interception
Look Familiar?
Think back, when was the last time you accessed a Wi-Fi hot spot?
Hmm, where was I?
For companies with employees who use Wi-Fi
hotspots
… the stakes are high!
Malicious Code
Malware attacks are no longer confined to PCs!
In fact, mobile malware threats are on the rise…
..and continue to affect the
most prevalent mobile
operating systems
Here’s an interesting fact for you Cristiano, in 2011…
Before
After
Wow that’s
shocking!
Device Attacks
Device attacks are typically designed to gain control of the device and access content…
…or attempt a denial of service (DOS).
DEVICE ATTACKS are similar to PC ATTACKS of the past, such as…
Browser-based attacks
Buffer overflow expectations
Application-based attacks
Physical
Access
Cristiano, aren’t Mobile Devices the perfect travel companion?
I mean they are…
small
portable
and lightweight.
But that also means, they are…
1. Easy to steal.
2. Leave behind.
Oh , and remember
this slide?
25,000 MOBILE
PHONES left in
taxis in Dublin
alone!
Ah, I see what
you did there.
You clever
dog.
Insider Threats
Threats can also come from within your organisation.
Malicious insiders can use mobile devices to
leak important
data.
Sharing corporate information from a smartphone will..
..often circumvent
robust monitoring systems, like Data Loss Prevention.
Really?
Seriously?
Yes Cristiano, REALLY!
Lets review the 5
Key Security
Risks one more
time.
Whether or not your company has formally
adopted mobile devices…
They are in your enterprise.
So what should YOU do?
Sounds
good to me.