technology workshop going mobile! - ekaruand secure with mobile devices. we’ll wrap up before 1pm....
TRANSCRIPT
![Page 1: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/1.jpg)
Technology Workshop
Going Mobile!
November 15, 2012
![Page 2: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/2.jpg)
Copyright 2012. Ekaru, LLC. 2
Welcome!
Thank you for joining us today.
In today’s call we will cover a few tips and tricks to help you get more efficient and secure with mobile devices. We’ll wrap up before 1pm.
If you want to follow from your office, go to www.ekaru.com / Go to “What’s New” near the bottom of the page. Presentation will open in a browser, click the down arrow in nav bar to advance slides.
![Page 3: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/3.jpg)
Copyright 2012. Ekaru, LLC. 3
Format
Given the number of people on the line today, this is a “listen only” call. (Reason, cut down on ambient noise, avoid
“call on hold music” – a bit tough though, because I can’t hear you!)
If you have questions, please eMail to [email protected] and we will try to include Q&A at the end of the call – we will be reviewing email live during the call.
Call 978-692-4200 for help.
![Page 4: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/4.jpg)
Copyright 2012. Ekaru, LLC. 4 4
Workshop Mission
Help you get more from the technology you already have.
Introduce you to new technologies you need to know about.
![Page 5: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/5.jpg)
Going Mobile!
Copyright 2012. Ekaru, LLC. 5
![Page 6: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/6.jpg)
BYOD
Bring your own device (BYOD) is a business policy of employees bringing personally owned mobile devices to their place of work and using those devices to access privileged company resources such as email, file servers and databases as well as their personal applications and data
Copyright 2012. Ekaru, LLC. 6
![Page 7: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/7.jpg)
Where is your information?
Where is your company information?
What data is entering and leaving your network every day?
Copyright 2012. Ekaru, LLC. 7
![Page 8: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/8.jpg)
BCBS Data Breach 2010
BCBS employee took home a spreadsheet on a laptop to work on it after hours.
The laptop was stolen from a car No one knew exactly what was on the laptop.
Several weeks later, they realized that personal information for just about all BCBS Physicians nationwide were on the laptop
The laptop was NOT encrypted. 39,000 MA physicians notified of breach at
BCBS (estimate 850,000 nationwide!) Long delay to notify physicians
Copyright 2012. Ekaru, LLC. 8
![Page 9: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/9.jpg)
Threats to Business
Copyright 2012. Ekaru, LLC. 9
Kaspersky Lab & B2B International
![Page 10: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/10.jpg)
Preventative Measures
Copyright 2012. Ekaru, LLC. 10
![Page 11: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/11.jpg)
Security Statistics
33% of companies allow their staff unrestricted access to corporate resources from their smartphones.
10% of respondents said they had experienced critical information leaks due to the loss or theft of a mobile device.
Only 9% plan to introduce tough restrictions.
- B2B International in July 2012.
Copyright 2012. Ekaru, LLC. 11
![Page 12: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/12.jpg)
Balance
Convenience vs Security
Copyright 2012. Ekaru, LLC. 12
![Page 13: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/13.jpg)
Two major concerns
What is entering your network?
What is leaving your network?
Copyright 2012. Ekaru, LLC. 13
![Page 14: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/14.jpg)
Mobile Security
Legal Requirements
Protect your Business
Copyright 2012. Ekaru, LLC. 14
![Page 15: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/15.jpg)
15
MA Data Security Law
Law went into effect 2010
Applies to “Personal Information” for MA residents
* Personal Information = (First name or initial)+ last name + (SSN or Financial Account Number or Drivers License, etc).
Copyright 2012. Ekaru, LLC.
![Page 16: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/16.jpg)
Security with public WI-FI
Router that connects to Internet has a firewall to protect users from outsiders
BUT, on a local network, you are basically trusting everyone there unless you use precautions.
16 © 2012 Ekaru,
LLC
![Page 17: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/17.jpg)
Set your security to “Public Network”
To see what your current settings are and to change them, go to Control Panel, Network & Sharing Center. For a Public Network, the icon is a Park Bench. To see the individual settings, click on "Change Advanced Sharing Settings".
17 © 2012 Ekaru,
LLC
![Page 18: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/18.jpg)
Public Security Settings
18 © 2012 Ekaru,
LLC
![Page 19: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/19.jpg)
Public Security Settings
1) Turn off Network Discovery - When Network Discovery is ON, your computer can see other computers and devices on the network and they can see you.
2) Turn off File and Printer Sharing - When File and Printer Sharing is ON, files and printers you have shared on this computer can be access by other people on the network.
3) Turn off Public Folder Sharing - When public Folder Sharing is ON, people on the network can access Public Folders.
4) Turn on Password Protected Sharing - if you are going to share files and folders, make sure Password Protected Sharing is ON so that only users with a user name and password for your system could access the files.
5) Additionally, Turn ON Windows Firewall. Go to Control Panel, Windows Firewall and check that its ON. The firewall helps prevent other systems on the network (all the people you don't know in the coffee shop) from potentially spreading malicious software or accessing your system.
6) When accessing web sites, look for SSL encryption to make sure your transmissions are protected. Look for "HTTPS" in the web address.
19
© 2012 Ekaru, LLC
![Page 20: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/20.jpg)
Turn of Wireless if you don’t need it!
Hit “Windows Key” + X – Lots of on/off switches
20 © 2012 Ekaru,
LLC
![Page 21: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/21.jpg)
MA Data Security Law - 4
“Encryption of all transmitted records and files containing personal information that will travel across public networks, and encryption of all data containing personal information to be transmitted wirelessly.”
Copyright 2012. Ekaru, LLC. 21
![Page 22: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/22.jpg)
MA Data Security Law - 5
Encryption of all personal information stored on laptops or other portable devices
Laptops
Smartphones
Portable Hard Drives
USB “Thumb” Drives
Copyright 2012. Ekaru, LLC. 22
![Page 23: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/23.jpg)
Laptop
Full Disk Encryption
We recommend
PGP and
TrueCrypt (Open Source)
Self encrypting drives
DO NOT FORGET YOUR PASSPHRASE
Copyright 2012. Ekaru, LLC. 23
![Page 24: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/24.jpg)
Copyright 2012. Ekaru, LLC. 24
iPhone Security
PIN Lock
Option to wipe after 10 failed attempts
“Find my iPhone” If you misplace your iPhone, iPad, iPod touch, or Mac, the Find My iPhone app will let you use another iOS device to find it and protect your data. Simply install this free app on another iOS device, open it, and sign in with your Apple ID. Find My iPhone will help you locate your missing device on a map, play a sound, display a message, remotely lock
Keep OS updated
![Page 25: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/25.jpg)
Encrypt a SmartPhone
Examples from PCWorld
WhisperCore
DroidCrypt
AnDisk Encryption
Files / Folders / Images
What files should be allowed?
Watch billing statements – common malware is to send “premium” texts
Copyright 2012. Ekaru, LLC. 25
![Page 26: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/26.jpg)
MA Data Security Law - 6
“For files containing personal information on a system that is connected to the Internet, there must be reasonably up-to-date firewall protection and operating system security patches, reasonably designed to maintain the integrity of the personal information.”
Copyright 2012. Ekaru, LLC. 26
![Page 27: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/27.jpg)
Security with public WI-FI
Router that connects to Internet has a firewall to protect users from outsiders
BUT, on a local network, you are basically trusting everyone there unless you use precautions.
27 © 2012 Ekaru,
LLC
![Page 28: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/28.jpg)
Set your security to “Public Network”
To see what your current settings are and to change them, go to Control Panel, Network & Sharing Center. For a Public Network, the icon is a Park Bench. To see the individual settings, click on "Change Advanced Sharing Settings".
28 © 2012 Ekaru,
LLC
![Page 29: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/29.jpg)
Public Security Settings
29 © 2012 Ekaru,
LLC
![Page 30: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/30.jpg)
Public Security Settings
1) Turn off Network Discovery - When Network Discovery is ON, your computer can see other computers and devices on the network and they can see you.
2) Turn off File and Printer Sharing - When File and Printer Sharing is ON, files and printers you have shared on this computer can be access by other people on the network.
3) Turn off Public Folder Sharing - When public Folder Sharing is ON, people on the network can access Public Folders.
4) Turn on Password Protected Sharing - if you are going to share files and folders, make sure Password Protected Sharing is ON so that only users with a user name and password for your system could access the files.
5) Additionally, Turn ON Windows Firewall. Go to Control Panel, Windows Firewall and check that its ON. The firewall helps prevent other systems on the network (all the people you don't know in the coffee shop) from potentially spreading malicious software or accessing your system.
6) When accessing web sites, look for SSL encryption to make sure your transmissions are protected. Look for "HTTPS" in the web address.
30
© 2012 Ekaru, LLC
![Page 31: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/31.jpg)
Turn of Wireless if you don’t need it!
Hit “Windows Key” + X – Lots of on/off switches
31 © 2012 Ekaru,
LLC
![Page 32: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/32.jpg)
MA Data Security Law - 7
”Reasonably up-to-date versions of system security agent software which must include malware protection and reasonably up-to-date patches and virus definitions, or a version of such software that can still be supported with up-to-date patches and virus definitions, and is set to receive the most current security updates on a regular basis.”
Copyright 2012. Ekaru, LLC. 32
![Page 33: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/33.jpg)
Android Market Malware
Many reports of malware
Google put in scanners, but still some stuff getting through.
Impact of devices on company network?
Copyright 2012. Ekaru, LLC. 33
![Page 34: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/34.jpg)
Watch for Phishing emails
You can click on a bad link to get malware
Many “fake” emails from Verizon, JetBlue, ATT, UPS, etc.
Consider perimeter security
Smart phones connecting via Wireless, not 3G, 4G
Copyright 2012. Ekaru, LLC. 34
![Page 35: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/35.jpg)
MA Data Security Law - 8
“Education and training of employees on the proper use of the computer security system and the importance of personal information security.”
People generally “break the rules” for convenience. Education is key!
Copyright 2012. Ekaru, LLC. 35
![Page 36: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/36.jpg)
Employee Training
Educate
Establish Clear Rules
Things to think about:
Installing company email on smart phones
Policies about bringing devices onto work network
What files can leave the building?
Copyright 2012. Ekaru, LLC. 36
![Page 37: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/37.jpg)
MDM – Mobile Device Management
December 2012, Q1 2013
Managed Service Clients: End-to-end MDM that simplifies the entire lifecycle - from
device provisioning, security, monitoring, and reporting to app distribution and document sharing - all through a single, comprehensive platform
BYOD support
includes standard security services such as remote device lock and password enforcement,
ability to selectively wipe corporate data, automate procedures for lost devices, prevent data leaks, detect and restrict jail-broken and rooted devices.
Copyright 2012. Ekaru, LLC. 37
![Page 38: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/38.jpg)
Synchronization - Exchange
Exchange Mail
Local – Server on site
Cloud (“hosted”)
Mix and match regular and Exchange hosted mailboxes
Solution is fully designed for synchronization.
Copyright 2012. Ekaru, LLC. 38
![Page 39: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the](https://reader033.vdocuments.us/reader033/viewer/2022050609/5fb093f0ba0c25165e504188/html5/thumbnails/39.jpg)
Copyright 2012. Ekaru, LLC. 39 39
Thank You!:
For more information:
Ekaru Connecting People with Technology
978-692-4200
www.ekaru.com
Sign up for Ekaru’s free Technology Advisor e-newsletter
Next webinar: Replay of Microsoft Outlook Tips and Tricks…