mobile security trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 steps to security the...
TRANSCRIPT
![Page 1: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/1.jpg)
Mobile Security Trends
Gregg Martin, Director, Mobile Security
![Page 2: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/2.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Agenda
� Mobile Trends
� Enterprise Challenges
� Mobile Threats
� Mobile Awareness
� Mobile Security Technology
� Mobile Security Offerings
� Q&A
![Page 3: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/3.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Trends
![Page 4: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/4.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Trends
� Fast paced & dynamic environment
� Bring Your Own Device (BYOD)
� Increased demand to internal resources
� Displacement of BlackBerry
Registered Trademark of Audi
![Page 5: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/5.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Trends
2011 – Mobile Market
Source: mobilethinking.com
China
1,002 Million
India
919 Million
USA
332 Million
2016 = 8 Billion
![Page 6: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/6.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Trends
Android is a registered trademark of Google Inc. Apple Inc. is a registered trademark of Apple Source: Lookout Security All Rights Reserved.
![Page 7: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/7.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Trends
4.1.x – Jelly Bean
• Distribution - .8%
4.0.x – Ice Cream Sandwich
• Distribution – 15.9%
3.0.x - Honeycomb
• Distribution – 2.3%
2.3.x - Gingerbread
• Distribution – 60.6%
2.2 - Froyo
• Distribution – 15.5%
2.0/2.1 - Éclair
• Distribution – 15.5%
1.6 Donut
• Distribution - .5%
1.5 - Cupcake
• Distribution - .2%
�Android – Choose your flavor!
�Open Architecture
�Manufactures
�C2DM
�ASLR
![Page 8: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/8.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Trends
� Jelly Bean
� App Encryption
� Smart App Update
� Improved HTML5 Support
� JavaScript Engine (8)
Image Copyrights Google & Samsung and their respective owners All Rights Reserved.
![Page 9: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/9.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Trends
� Android – Root� Why Root?
� Full OS control
� Control manufacture ‘bloatware’
� Free apps
� Tethering
� Roots� SuperOneClick
� Unlock Root
![Page 10: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/10.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Trends
Apple iOS (6)� Siri
� Additional language support
� Ask more
� Integration within iOS
� Redesigned & new features
� Passbook
� Boarding Passes
� Movie Tickets
� Facetime
� Over Cellular Networks
Image Copyrights Apple Inc., and their respective owners All Rights Reserved.
![Page 11: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/11.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Trends
� iOS SDK Updates� Security
� Protects Calendar, Reminders, Contacts & Photos
� Enable/Disable per app
� iCloud� Key-value storage for discrete values, such as preferences. Use key-value
storage for small amounts of data: stocks or weather information, locations, bookmarks, settings and preferences, and simple game state.
� Document storage for user-visible file-based information. Use document storage for file-based user content: presentations, word-processing documents, diagrams or drawings, and complex game state.
� Core Data storage for structured data. iCloud Core Data storage is built on iCloud document storage. Use Core Data storage for server-based, multi-device database solutions for structured content.
Image Copyrights Apple Inc., and their respective owners All Rights Reserved.
![Page 12: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/12.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Trends
Apple - Jailbreaks
� Goehot – Limera1n
� Pod2g & Dream Team
� Jailbreakme.com
� Redsn0w
� iOS 6 beta 4
Image Copyrights Apple Inc., and their respective owners All Rights Reserved.
![Page 13: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/13.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Enterprise Challenges
![Page 14: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/14.jpg)
© 2012 FishNet Security Inc. All rights reserved.
10 Steps to Security the Mobile Workforce
Update your Security Policy1
Mobile Security Awareness Training2
Mobile Provisioning/Workflow Process3
Strong Authentication for Mobile Device access4
Centralize Security Policy Manage Process & Tools5
Encryption6
Endpoint Security Tools7
Device lockdown and remote wipe capabilities8
Access logging and file integrity monitoring with centralize log repository9
Accessing Content/Internal Resources10
![Page 15: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/15.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Enterprise Challenges & Risks
Element Description
AuthenticationHow often a password must be changed. How many invalid tries are allowed
before the device is disabled. Strong authentication using two factor or
certificates.
Loss / TheftLost or stolen device are remotely wiped and disabling of the device over a
defined period of time.
Device SupportDefine what devices are supported by the institution/organization i.e.
Blackberry, Mac/PC’s.
Encryption Sensitive data must be encrypted or devices is encrypted with WDE.
Backup / RestoreIf a device could be lost or stolen, there should be a defined procedure for
backing up and restoring the data to another device.
Storage CardsStorage cards are a convenient way to expand memory, but they're also
portable and thus a security risk. Do you ban them? Or, encrypt them?
Acceptable UseA good security policy needs to set limits on what users can install on their
devices and what is acceptable use.
Enforcement Consequences if there is violation of the policy.
![Page 16: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/16.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Enterprise Challenges
Image Copyrights Apple Inc., and their respective owners All Rights Reserved.
� Requirements
� What devices to support?
� Security challenges
� Policies
� Accessing corporate content
� Loss/theft
� Providing access to internal
resources
� Human Resources - Concerns
![Page 17: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/17.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Enterprise Challenges
� What are organizations doing?� Corporate Liable vs. Personal
Liable (BYOD)
� Hybrid
� Why BYOD?� Costs
� Executive adoption
� Work/Life Balance
� Productivity
![Page 18: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/18.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Enterprise Challenges
� Additional Concerns
� Data stored in the cloud
� Differentiate personal and business data
� DLP/Data Classification
� Identity Access Management
![Page 19: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/19.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Risks &Threats
![Page 20: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/20.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Threats & Risks
� Lost & theft of mobile devices
� Applications
� Encryption
� Malware
� Other Risks
![Page 21: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/21.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Threats
Source: Lookout Security
Mobile Threats & Risks
Average 113 phones lost every minute$50 average price for lost/stolen device
Las Vegas - estimated 5,000 cabs � average of 2 phones per week
� 10,000 phones per week
United Kingdom – London� Estimated 19,000 cabs (black cabs only)
� 10,000 phones per week
![Page 22: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/22.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Threats & Risks
� Backups
![Page 23: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/23.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Threats & Risks
� voicemail.db
![Page 24: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/24.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Threats & Risks
� sms.db
![Page 25: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/25.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Threats & Risks
/user/library/keyboard/dynamic-text.dat
![Page 26: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/26.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Threats & Risks
SQL Cipher logo is a registered trademark of zətetic . All Rights Reserved.
![Page 27: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/27.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Threats & Risks
SQL Cipher logo is a registered trademark of zətetic . All Rights Reserved.
![Page 28: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/28.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Threats & Risks
![Page 29: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/29.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Locating Data - iOS
![Page 30: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/30.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Locating Data - Android
![Page 31: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/31.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Threats & Risks
� Phishing� Fraudulent imitation of a site to obtain credentials or cc
� Clickjacking� Malicious technique to trick users into clicking a malformed link
� Likejacking� Uses Facebook like button
� Prevention� Don’t click on links
� Type the address
� User Awareness Training
“Like” Button, Registered trademark of Facebook.com
![Page 32: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/32.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Threats & Risks
Android� DroidDream
� Geinimi
� HongTouTou (aka ADRD)
� KungFu 2 & 3
� Zitmo
Blackberry� Zitmo
Source: Juniper Networks
iOS�Ikee
�iPhone.A
� Dutch 5€ Ransom
�Code signing exploit
Symbian� Cabir.A
![Page 33: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/33.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Awareness
![Page 34: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/34.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Breakdown of Free Apps
67%
61%
39%37%
26%
26%
Android Market
Windows Phone Marketplace
Samsung Apps
Apple App Store
Blackberry App World
Nokia Ovi Store
� What’s the risk?
Android is a registered Trademark of Google Inc. All Rights Reserved.
Google Play
![Page 35: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/35.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Awareness
=
Image Copyrights Google Inc. & Facebook Inc. All Rights Reserved.
![Page 36: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/36.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Awareness
� Mobile Security Awareness Training
� Educate users
� Apps
� Data
� Passcodes
![Page 37: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/37.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Security Technology
Image Copyrights gadgetnmore.com All Rights Reserved.
![Page 38: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/38.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Solutions
Logos are registered trademarks of their respective owners All Rights Reserved.
� Container Based
� Pure-Play Mobile Device Management (MDM)
� Mobile Application Management (MAM)
� Not an Enterprise App Store
� Next-Generation
� Mobile Content Management (MCM)
![Page 39: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/39.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Management
� Container-based
� Separation of personal &
corporate data
� Simple BYOD deployment
� Personal Information Manager
(PIM)
� Verticals
� Healthcare
� Financial
![Page 40: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/40.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Management
� MDM
� Device restrictions
� Use of native applications
� Simple architecture
� Verticals
� Technology
� Entertainment
� Transportation
![Page 41: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/41.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Management
� MAM
� Personal and corporate
application segmentation
� Policy based application
access
� Application and data
encrypted container
� Wipe only corporate data
and applications
� IAM application access
![Page 42: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/42.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Mobile Management
� MCM (Mobile Content Management)
� Secure access to internal resources
� Sharepoint
� Network Drives
� Document control
� Strong Authentication
![Page 43: Mobile Security Trendss3.amazonaws.com/rdcms-himss/files/production/... · 10 Steps to Security the Mobile Workforce 1 Update your Security Policy 2 Mobile Security Awareness Training](https://reader033.vdocuments.us/reader033/viewer/2022043012/5fa8186e18a32f3a96785ba8/html5/thumbnails/43.jpg)
© 2012 FishNet Security Inc. All rights reserved.
Thank You
Gregg MartinDirector Mobile Security ServicesFishNet [email protected]