technology workshop going mobile! - ekaruand secure with mobile devices. we’ll wrap up before 1pm....

39
Technology Workshop Going Mobile! November 15, 2012

Upload: others

Post on 13-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Technology Workshop

Going Mobile!

November 15, 2012

Page 2: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Copyright 2012. Ekaru, LLC. 2

Welcome!

Thank you for joining us today.

In today’s call we will cover a few tips and tricks to help you get more efficient and secure with mobile devices. We’ll wrap up before 1pm.

If you want to follow from your office, go to www.ekaru.com / Go to “What’s New” near the bottom of the page. Presentation will open in a browser, click the down arrow in nav bar to advance slides.

Page 3: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Copyright 2012. Ekaru, LLC. 3

Format

Given the number of people on the line today, this is a “listen only” call. (Reason, cut down on ambient noise, avoid

“call on hold music” – a bit tough though, because I can’t hear you!)

If you have questions, please eMail to [email protected] and we will try to include Q&A at the end of the call – we will be reviewing email live during the call.

Call 978-692-4200 for help.

Page 4: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Copyright 2012. Ekaru, LLC. 4 4

Workshop Mission

Help you get more from the technology you already have.

Introduce you to new technologies you need to know about.

Page 5: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Going Mobile!

Copyright 2012. Ekaru, LLC. 5

Page 6: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

BYOD

Bring your own device (BYOD) is a business policy of employees bringing personally owned mobile devices to their place of work and using those devices to access privileged company resources such as email, file servers and databases as well as their personal applications and data

Copyright 2012. Ekaru, LLC. 6

Page 7: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Where is your information?

Where is your company information?

What data is entering and leaving your network every day?

Copyright 2012. Ekaru, LLC. 7

Page 8: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

BCBS Data Breach 2010

BCBS employee took home a spreadsheet on a laptop to work on it after hours.

The laptop was stolen from a car No one knew exactly what was on the laptop.

Several weeks later, they realized that personal information for just about all BCBS Physicians nationwide were on the laptop

The laptop was NOT encrypted. 39,000 MA physicians notified of breach at

BCBS (estimate 850,000 nationwide!) Long delay to notify physicians

Copyright 2012. Ekaru, LLC. 8

Page 9: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Threats to Business

Copyright 2012. Ekaru, LLC. 9

Kaspersky Lab & B2B International

Page 10: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Preventative Measures

Copyright 2012. Ekaru, LLC. 10

Page 11: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Security Statistics

33% of companies allow their staff unrestricted access to corporate resources from their smartphones.

10% of respondents said they had experienced critical information leaks due to the loss or theft of a mobile device.

Only 9% plan to introduce tough restrictions.

- B2B International in July 2012.

Copyright 2012. Ekaru, LLC. 11

Page 12: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Balance

Convenience vs Security

Copyright 2012. Ekaru, LLC. 12

Page 13: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Two major concerns

What is entering your network?

What is leaving your network?

Copyright 2012. Ekaru, LLC. 13

Page 14: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Mobile Security

Legal Requirements

Protect your Business

Copyright 2012. Ekaru, LLC. 14

Page 15: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

15

MA Data Security Law

Law went into effect 2010

Applies to “Personal Information” for MA residents

* Personal Information = (First name or initial)+ last name + (SSN or Financial Account Number or Drivers License, etc).

Copyright 2012. Ekaru, LLC.

Page 16: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Security with public WI-FI

Router that connects to Internet has a firewall to protect users from outsiders

BUT, on a local network, you are basically trusting everyone there unless you use precautions.

16 © 2012 Ekaru,

LLC

Page 17: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Set your security to “Public Network”

To see what your current settings are and to change them, go to Control Panel, Network & Sharing Center. For a Public Network, the icon is a Park Bench. To see the individual settings, click on "Change Advanced Sharing Settings".

17 © 2012 Ekaru,

LLC

Page 18: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Public Security Settings

18 © 2012 Ekaru,

LLC

Page 19: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Public Security Settings

1) Turn off Network Discovery - When Network Discovery is ON, your computer can see other computers and devices on the network and they can see you.

2) Turn off File and Printer Sharing - When File and Printer Sharing is ON, files and printers you have shared on this computer can be access by other people on the network.

3) Turn off Public Folder Sharing - When public Folder Sharing is ON, people on the network can access Public Folders.

4) Turn on Password Protected Sharing - if you are going to share files and folders, make sure Password Protected Sharing is ON so that only users with a user name and password for your system could access the files.

5) Additionally, Turn ON Windows Firewall. Go to Control Panel, Windows Firewall and check that its ON. The firewall helps prevent other systems on the network (all the people you don't know in the coffee shop) from potentially spreading malicious software or accessing your system.

6) When accessing web sites, look for SSL encryption to make sure your transmissions are protected. Look for "HTTPS" in the web address.

19

© 2012 Ekaru, LLC

Page 20: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Turn of Wireless if you don’t need it!

Hit “Windows Key” + X – Lots of on/off switches

20 © 2012 Ekaru,

LLC

Page 21: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

MA Data Security Law - 4

“Encryption of all transmitted records and files containing personal information that will travel across public networks, and encryption of all data containing personal information to be transmitted wirelessly.”

Copyright 2012. Ekaru, LLC. 21

Page 22: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

MA Data Security Law - 5

Encryption of all personal information stored on laptops or other portable devices

Laptops

Smartphones

Portable Hard Drives

USB “Thumb” Drives

Copyright 2012. Ekaru, LLC. 22

Page 23: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Laptop

Full Disk Encryption

We recommend

PGP and

TrueCrypt (Open Source)

Self encrypting drives

DO NOT FORGET YOUR PASSPHRASE

Copyright 2012. Ekaru, LLC. 23

Page 24: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Copyright 2012. Ekaru, LLC. 24

iPhone Security

PIN Lock

Option to wipe after 10 failed attempts

“Find my iPhone” If you misplace your iPhone, iPad, iPod touch, or Mac, the Find My iPhone app will let you use another iOS device to find it and protect your data. Simply install this free app on another iOS device, open it, and sign in with your Apple ID. Find My iPhone will help you locate your missing device on a map, play a sound, display a message, remotely lock

Keep OS updated

Page 25: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Encrypt a SmartPhone

Examples from PCWorld

WhisperCore

DroidCrypt

AnDisk Encryption

Files / Folders / Images

What files should be allowed?

Watch billing statements – common malware is to send “premium” texts

Copyright 2012. Ekaru, LLC. 25

Page 26: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

MA Data Security Law - 6

“For files containing personal information on a system that is connected to the Internet, there must be reasonably up-to-date firewall protection and operating system security patches, reasonably designed to maintain the integrity of the personal information.”

Copyright 2012. Ekaru, LLC. 26

Page 27: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Security with public WI-FI

Router that connects to Internet has a firewall to protect users from outsiders

BUT, on a local network, you are basically trusting everyone there unless you use precautions.

27 © 2012 Ekaru,

LLC

Page 28: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Set your security to “Public Network”

To see what your current settings are and to change them, go to Control Panel, Network & Sharing Center. For a Public Network, the icon is a Park Bench. To see the individual settings, click on "Change Advanced Sharing Settings".

28 © 2012 Ekaru,

LLC

Page 29: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Public Security Settings

29 © 2012 Ekaru,

LLC

Page 30: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Public Security Settings

1) Turn off Network Discovery - When Network Discovery is ON, your computer can see other computers and devices on the network and they can see you.

2) Turn off File and Printer Sharing - When File and Printer Sharing is ON, files and printers you have shared on this computer can be access by other people on the network.

3) Turn off Public Folder Sharing - When public Folder Sharing is ON, people on the network can access Public Folders.

4) Turn on Password Protected Sharing - if you are going to share files and folders, make sure Password Protected Sharing is ON so that only users with a user name and password for your system could access the files.

5) Additionally, Turn ON Windows Firewall. Go to Control Panel, Windows Firewall and check that its ON. The firewall helps prevent other systems on the network (all the people you don't know in the coffee shop) from potentially spreading malicious software or accessing your system.

6) When accessing web sites, look for SSL encryption to make sure your transmissions are protected. Look for "HTTPS" in the web address.

30

© 2012 Ekaru, LLC

Page 31: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Turn of Wireless if you don’t need it!

Hit “Windows Key” + X – Lots of on/off switches

31 © 2012 Ekaru,

LLC

Page 32: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

MA Data Security Law - 7

”Reasonably up-to-date versions of system security agent software which must include malware protection and reasonably up-to-date patches and virus definitions, or a version of such software that can still be supported with up-to-date patches and virus definitions, and is set to receive the most current security updates on a regular basis.”

Copyright 2012. Ekaru, LLC. 32

Page 33: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Android Market Malware

Many reports of malware

Google put in scanners, but still some stuff getting through.

Impact of devices on company network?

Copyright 2012. Ekaru, LLC. 33

Page 34: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Watch for Phishing emails

You can click on a bad link to get malware

Many “fake” emails from Verizon, JetBlue, ATT, UPS, etc.

Consider perimeter security

Smart phones connecting via Wireless, not 3G, 4G

Copyright 2012. Ekaru, LLC. 34

Page 35: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

MA Data Security Law - 8

“Education and training of employees on the proper use of the computer security system and the importance of personal information security.”

People generally “break the rules” for convenience. Education is key!

Copyright 2012. Ekaru, LLC. 35

Page 36: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Employee Training

Educate

Establish Clear Rules

Things to think about:

Installing company email on smart phones

Policies about bringing devices onto work network

What files can leave the building?

Copyright 2012. Ekaru, LLC. 36

Page 37: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

MDM – Mobile Device Management

December 2012, Q1 2013

Managed Service Clients: End-to-end MDM that simplifies the entire lifecycle - from

device provisioning, security, monitoring, and reporting to app distribution and document sharing - all through a single, comprehensive platform

BYOD support

includes standard security services such as remote device lock and password enforcement,

ability to selectively wipe corporate data, automate procedures for lost devices, prevent data leaks, detect and restrict jail-broken and rooted devices.

Copyright 2012. Ekaru, LLC. 37

Page 38: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Synchronization - Exchange

Exchange Mail

Local – Server on site

Cloud (“hosted”)

Mix and match regular and Exchange hosted mailboxes

Solution is fully designed for synchronization.

Copyright 2012. Ekaru, LLC. 38

Page 39: Technology Workshop Going Mobile! - Ekaruand secure with mobile devices. We’ll wrap up before 1pm. If you want to follow from your office, go to / Go to “What’s New” near the

Copyright 2012. Ekaru, LLC. 39 39

Thank You!:

For more information:

Ekaru Connecting People with Technology

978-692-4200

www.ekaru.com

Sign up for Ekaru’s free Technology Advisor e-newsletter

Next webinar: Replay of Microsoft Outlook Tips and Tricks…