SlideShare a Scribd company logo
1 of 10
Download to read offline
Securing Mobile
Devices in
the Workplace
Six tips for midsize businesses

Brought to you by
Overview
Mobile devices have changed where and how we
work. And while this newfound mobility has made
us innovative and more efficient, it has also provided
a bit of a security headache. As mobile devices
and the subsequent BYOD movement have become
more prevalent in the workplace, companies are
increasingly losing controlled access to their data
and applications.

Brought to you by
Key Recommendations
Here are six tips that can make your company more
secure in the era of mobile devices and BYOD:
1. Apply mobile device management software
2. Rethink your perimeter strategy
3. Classify, classify, classify
4. Make security relatable and understandable
5. Undertake a functional exercise
6. Be prepared for devices that will inevitably get lost
Brought to you by
TIP #1

Apply mobile device
management software to
employee devices.
• Do you have a corporate policy and a company culture that support 	gaining 		
	 control of your employee’s device? If so, insist on mobile device management 		
	 that will enforce encryption of data, remote wipe policies, and restrict what an 		
	 employee can install.
• Remember that people can get emotionally attached to their smartphones
	 and tablets, so it may be challenging to tell your employees that you’re 				
	 restricting what they can do.

Brought to you by
TIP #2

Rethink your perimeter
strategy to accommodate
multiple types of users
and assets.
• If you don’t have a robust security department, cloud providers may be able to 			
	 give you much better security than you can provide yourself. However, they 				
	 have no context about your data: what is business critical intellectual property 			
	 vs. your aunt’s cookie recipes.

Brought to you by
TIP #3

Classify, classify, classify.
• Classify data first, then classify user roles.
• You don’t need to catalog every asset. Instead, identify those assets that contain 		
	 critical or confidential business information.
		 – Identify assets, applications and applications owners.
		 – Assess the criticality of your data and differentiate between the importance of 		
		 the data and the importance of the asset.

Brought to you by
TIP #4

Identify the most important
business information and
then make decisions from the
inside-out.
• Avoid frustration. Start in an area where you already have some control.

1
Brought to you by

2

3
TIP #5

Undertake a
functional exercise.
• After you have identified your assets and data, think about who uses them
	 and how they use them.
• Ask yourself how do you want to deploy this? How do I want to provide
	 secure access?
• Use the following categories:
		
		
		
		
Brought to you by

– Things that are only accessible by trusted internal devices
– Things that are untrusted
– Things that are one size fits all
– Untrusted applications that you don’t allow access to at all
TIP #6

Be prepared for devices that
will inevitably get lost.
• Safeguard all email. It can contain everything from cat pictures to weapons 				
	 systems schematics.
• Install remote wipe function on all devices.
• Make sure endpoint management supports “find my device” capability.
• Enforce password protection, data encryption, and other strong security
	 practices on mobile devices through MDM.
• Enable the option to erase all data on devices after five login failures.

Brought to you by
Getting started
Traditional defenses are no longer enough. In the era
of mobile devices, you need to develop a proactive
security plan now before your company becomes just
another victim.
Learn more

Brought to you by

Download the IBM white paper,
“Integrated IT Security for Midsized Businesses”.

More Related Content

What's hot

Security Impact of Data Visibility - Your New 90-Second Superpower
Security Impact of Data Visibility - Your New 90-Second SuperpowerSecurity Impact of Data Visibility - Your New 90-Second Superpower
Security Impact of Data Visibility - Your New 90-Second SuperpowerThinAir
 
Learning from an Enterprise Videoconferencing Rollout
Learning from an Enterprise Videoconferencing RolloutLearning from an Enterprise Videoconferencing Rollout
Learning from an Enterprise Videoconferencing RolloutRaj Sambwani
 
3 essentials in info technology (1)
3 essentials in info technology (1)3 essentials in info technology (1)
3 essentials in info technology (1)LiveTiles
 
Security From The Ground Up
Security From The Ground UpSecurity From The Ground Up
Security From The Ground Upbuggeen
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ EnterprisesNigel Hanson
 
Mobile security new challenges practical solutions
Mobile security new challenges practical solutionsMobile security new challenges practical solutions
Mobile security new challenges practical solutionsInterop
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Phil Grimes - Penetrating the Perimeter: Tales from the BattlefieldPhil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefieldcentralohioissa
 
Securitate In Google Apps
Securitate In Google AppsSecuritate In Google Apps
Securitate In Google Appsrazvanroman
 
Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)Siti Mustiani
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
Big data in term of security measure
Big data in term of security measureBig data in term of security measure
Big data in term of security measureYaakub Idris
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom BainEC-Council
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 

What's hot (20)

Security Impact of Data Visibility - Your New 90-Second Superpower
Security Impact of Data Visibility - Your New 90-Second SuperpowerSecurity Impact of Data Visibility - Your New 90-Second Superpower
Security Impact of Data Visibility - Your New 90-Second Superpower
 
VIISA Investment Day #4 - SecurityBox
VIISA Investment Day #4 - SecurityBoxVIISA Investment Day #4 - SecurityBox
VIISA Investment Day #4 - SecurityBox
 
Learning from an Enterprise Videoconferencing Rollout
Learning from an Enterprise Videoconferencing RolloutLearning from an Enterprise Videoconferencing Rollout
Learning from an Enterprise Videoconferencing Rollout
 
3 essentials in info technology (1)
3 essentials in info technology (1)3 essentials in info technology (1)
3 essentials in info technology (1)
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Security From The Ground Up
Security From The Ground UpSecurity From The Ground Up
Security From The Ground Up
 
Tablet Security
Tablet SecurityTablet Security
Tablet Security
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises
 
The Benefits of a Network Security Plan
The Benefits of a Network Security PlanThe Benefits of a Network Security Plan
The Benefits of a Network Security Plan
 
Tablet Security
Tablet SecurityTablet Security
Tablet Security
 
Mobile security new challenges practical solutions
Mobile security new challenges practical solutionsMobile security new challenges practical solutions
Mobile security new challenges practical solutions
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Phil Grimes - Penetrating the Perimeter: Tales from the BattlefieldPhil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
 
Securitate In Google Apps
Securitate In Google AppsSecuritate In Google Apps
Securitate In Google Apps
 
Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
Big data in term of security measure
Big data in term of security measureBig data in term of security measure
Big data in term of security measure
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 

Viewers also liked

VP Meeting Slideshow
VP Meeting SlideshowVP Meeting Slideshow
VP Meeting Slideshowcraigcantlie
 
An African Adventure - Summits of Hope
An African Adventure - Summits of HopeAn African Adventure - Summits of Hope
An African Adventure - Summits of Hopecraigcantlie
 
Innovation team presentation ri 2013
Innovation team presentation   ri 2013Innovation team presentation   ri 2013
Innovation team presentation ri 2013craigcantlie
 
Curriculum Night 2013
Curriculum Night 2013Curriculum Night 2013
Curriculum Night 2013craigcantlie
 
Curriculum night 2014
Curriculum night 2014Curriculum night 2014
Curriculum night 2014craigcantlie
 
VP Meeting (Nov) - Window into Ridgeview
VP Meeting (Nov) - Window into RidgeviewVP Meeting (Nov) - Window into Ridgeview
VP Meeting (Nov) - Window into Ridgeviewcraigcantlie
 
Joseph cornell
Joseph cornellJoseph cornell
Joseph cornellsoulsama
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the HourVijay Dalmia
 

Viewers also liked (9)

Expectations
ExpectationsExpectations
Expectations
 
VP Meeting Slideshow
VP Meeting SlideshowVP Meeting Slideshow
VP Meeting Slideshow
 
An African Adventure - Summits of Hope
An African Adventure - Summits of HopeAn African Adventure - Summits of Hope
An African Adventure - Summits of Hope
 
Innovation team presentation ri 2013
Innovation team presentation   ri 2013Innovation team presentation   ri 2013
Innovation team presentation ri 2013
 
Curriculum Night 2013
Curriculum Night 2013Curriculum Night 2013
Curriculum Night 2013
 
Curriculum night 2014
Curriculum night 2014Curriculum night 2014
Curriculum night 2014
 
VP Meeting (Nov) - Window into Ridgeview
VP Meeting (Nov) - Window into RidgeviewVP Meeting (Nov) - Window into Ridgeview
VP Meeting (Nov) - Window into Ridgeview
 
Joseph cornell
Joseph cornellJoseph cornell
Joseph cornell
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the Hour
 

Similar to Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses

11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...Diego Alberto Tamayo
 
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility managementTim Youm
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!Caroline Johnson
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device managementJason Murray
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?Miradore
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility ManagementSprint Business
 

Similar to Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses (20)

11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
 
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility management
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
Byod
ByodByod
Byod
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses

  • 1. Securing Mobile Devices in the Workplace Six tips for midsize businesses Brought to you by
  • 2. Overview Mobile devices have changed where and how we work. And while this newfound mobility has made us innovative and more efficient, it has also provided a bit of a security headache. As mobile devices and the subsequent BYOD movement have become more prevalent in the workplace, companies are increasingly losing controlled access to their data and applications. Brought to you by
  • 3. Key Recommendations Here are six tips that can make your company more secure in the era of mobile devices and BYOD: 1. Apply mobile device management software 2. Rethink your perimeter strategy 3. Classify, classify, classify 4. Make security relatable and understandable 5. Undertake a functional exercise 6. Be prepared for devices that will inevitably get lost Brought to you by
  • 4. TIP #1 Apply mobile device management software to employee devices. • Do you have a corporate policy and a company culture that support gaining control of your employee’s device? If so, insist on mobile device management that will enforce encryption of data, remote wipe policies, and restrict what an employee can install. • Remember that people can get emotionally attached to their smartphones and tablets, so it may be challenging to tell your employees that you’re restricting what they can do. Brought to you by
  • 5. TIP #2 Rethink your perimeter strategy to accommodate multiple types of users and assets. • If you don’t have a robust security department, cloud providers may be able to give you much better security than you can provide yourself. However, they have no context about your data: what is business critical intellectual property vs. your aunt’s cookie recipes. Brought to you by
  • 6. TIP #3 Classify, classify, classify. • Classify data first, then classify user roles. • You don’t need to catalog every asset. Instead, identify those assets that contain critical or confidential business information. – Identify assets, applications and applications owners. – Assess the criticality of your data and differentiate between the importance of the data and the importance of the asset. Brought to you by
  • 7. TIP #4 Identify the most important business information and then make decisions from the inside-out. • Avoid frustration. Start in an area where you already have some control. 1 Brought to you by 2 3
  • 8. TIP #5 Undertake a functional exercise. • After you have identified your assets and data, think about who uses them and how they use them. • Ask yourself how do you want to deploy this? How do I want to provide secure access? • Use the following categories: Brought to you by – Things that are only accessible by trusted internal devices – Things that are untrusted – Things that are one size fits all – Untrusted applications that you don’t allow access to at all
  • 9. TIP #6 Be prepared for devices that will inevitably get lost. • Safeguard all email. It can contain everything from cat pictures to weapons systems schematics. • Install remote wipe function on all devices. • Make sure endpoint management supports “find my device” capability. • Enforce password protection, data encryption, and other strong security practices on mobile devices through MDM. • Enable the option to erase all data on devices after five login failures. Brought to you by
  • 10. Getting started Traditional defenses are no longer enough. In the era of mobile devices, you need to develop a proactive security plan now before your company becomes just another victim. Learn more Brought to you by Download the IBM white paper, “Integrated IT Security for Midsized Businesses”.