SlideShare a Scribd company logo
1 of 36
Cybersecurity
Frameworks and You
The Perfect Match
Building Successful
Employee Relationships
A Cornerstone to Fraud Prevention
and Risk Management
Building Successful
Employee Relationships
A Cornerstone to Fraud Prevention
and Risk Management
Mobile Security
Outside the Office
Introductions
Tyler Wenger
• Helpdesk Technician
• Marketing Consultant
• Microsoft Technology Associate (MTA)
David Hammarberg
• Principal of Forensic Accounting
• Certified Fraud Examiner (CFE)
• Director of Information Technology
• CPA, MCSE, CISSP, CISA
• 16+ years of experience
Today’s Objective
• To better understand mobile technologies, the threats that
exist within a mobile / remote environment, how to avoid
and thwart those threats, and to understand your role
within mobile security.
Why Is This Important?
• Usage
• Time
• Accessibility
• Money
• Constantly Changing
• Data! Data! Data!
Takes Two To Be Secure
• Proper Security measures need to be put in place by the IT
department to keep mobile users secure.
• Proper employee security training needs to be place.
Agenda
• An overview of the smartphone / tablet industry
• An understanding of what mobile technologies are being used by
small to medium size organizations
• An understanding of the increased risk of mobile technology
• An understanding of mitigation strategies for risks associated with
mobile technologies. What is your mobility strategy?
• Living in a mobile world: practical steps and real questions
Mobile Technology
• Smart Phones
• Tablets
• Laptops
• Watches
• BYOD
Smartphone Statistics
• Research estimates more than six billion smartphone users by 2020
• Over 50% of smartphone users grab their smartphone immediately after waking
up
• 84% of mobile users utilize the same smartphone for business and personal use
• Mobile email opens have grown by 180% in the last three years
• Mobile will likely account for 50% of all digital ad spend in 2016 (worth $100B)
Data from https://www.impactbnd.com/blog/mobile-marketing-statistics-for-2016 and https://www.sophos.com/en-
us/security-news-trends/security-trends/malware-goes-mobile.aspx
Smartphones
• All-In-One Devices
• Super Computers
• Limitless Mobility
• Size
• Physical security
• Unique Operating Systems (OS)
• Apple (iOS)
• Android
• Windows
• Mobile Fragmentation
• Susceptible to attacks
• App Based, web-based, or SMS/Text Message-based
Apple vs. Android
• Android
• Global popularity and open approach
• Open source vs proprietary
• Lack of control of its potential integrations
• Apple
• Control the entire ecosystem
• Software, hardware, firmware
• App Transport Security (ATS)
• Secures user data sent via Apps
• "The majority of enterprises still feel it is easier for them to secure their
enterprise data on the iOS platform.” - Mobile Analyst Dionisio Zumerle
7 Tips for Smartphone Security
1. Use a PIN or Password
2. Download Apps only from trusted stores
• Apple App Store
• Google Play Store
3. Keep your Operating System and Apps Update
4. Log Out of sites / apps after completing transactions
5. Turn off Wi-Fi and Bluetooth when not in use
6. Backup your data
7. Avoid giving out personal information
Secure Technology Options for Mobile
Users
• Citrix
• VPN – Company to User
• Cloud based – Connection to the Cloud Server
• MDM – Mobile Device management Solutions
What Are The Risks?
• Data breach caused by:
• Unsecure connections
• Lost or stolen mobile devices
• Unauthorized users
• Compromised devices connecting to the network
• Malware incident
Three Most Common Mobile Security
Breaches
1. Device loss / Theft
• Theft of all pertinent data
• Expensive international calls
• In app purchases
2. Malware
• Spam email contacts
• Infect other devices
• Harvest Passwords (secure password products?)
3. Unsecured Networks
• Rogue Wi-Fi Networks
• Tricks people into joining wrong network at airports, stations, or coffee shops
• More common in Asia than in US / Europe
Real Life Examples
• Mobile phishing and ransomware
• Using an infected mobile device to infiltrate nearby devices
• Cross-platform banking attacks
• Cryptocurrency mining attacks
Mobility Driving Business and IT
Change
• Forcing organizations to have BYOD policy and plan; provide
employee device choice
• Anytime, anywhere, any device access now standard
• Heightened importance of social business interactions
• Need to factor in considerations across the business not just IT- HR,
Legal, Security, Finance, Telco Plans.
Mobile Security and Management
• Protection of privacy and confidential information
• Policies for client-owned smartphones and tablets
• Visibility, security & management of mobile platform requirements
Mobile Strategy Helps You Make The Right
Choice
1. Understand current state and strategic direction.
2. Understand user profiles and their security requirements
3. Analyze gaps
4. Define recommendations and solution outline
5. Build road map
Key Areas You Need to Address
• Devices: Which device types and form factors should be supported and do I
have a need for special types of devices?
• Governance: What are the policies, guidelines and programs for mobile users
and bring-your-own devices? (BYOD)
• Support: What is the best way to support my users?
• Mobile Applications: What mobile applications do I have today and what is
the best way to roll out additional applications in the future?
• IT Infrastructure: What tools do I need in place to allow me to effectively
manage my mobile devices?
• Network: What type of network access will my users require? Cellular
Carrier? Corporate Wi-Fi?
• Security: What security policies should be in place to ensure the safety of my
corporate assets?
Bring Your Own Device (BYOD) -
Policy
• What are you trying to achieve?
• Define, document and publish your "Bring Your Own Device" (BYOD) Policy
• You need input from a number of departmental functions:
• IT
• HR
• Legal
• Security
• Finance
• Your network carrier(s)
• Entitlement
• Which employees are eligible for business devices (Corporate liable)?
• Which employees bring their own?
• What data, functions, applications will be accessed?
• Which devices will you support?
Mobile Device Management (MDM)
• Advanced mobile device management (MDM) functions are
designed to enhance security and usability of mobile devices
• Software that secures, monitors, manages and supports mobile devices
• Over-the-air distribution of applications, data and configuration settings
• Supports company-owned and employee-owned devices
Dual Factor Authentication
• Requires multiple factors for authentication
• Uses multiple combinations of the following…
• Something you know (username, password, PIN, etc.)
• Something you have (smartphone, Token Device, key fab, etc.)
• Something you are (fingerprint, retinal scan, voice recognition, etc.)
• Requires an extra step, but “an ounce of prevention is worth a
pound of cure.”
Dual Factor Vendors
• Duo Security
• RSA SecurID - Tokens
Security Awareness
• Employees are the largest risk to the organization.
• Employees can circumvent the best security policies.
• What is your organization doing to train your employees?
Mobile Threats: They Are Real
Mobile Threats: They Are Real
How Do I Know If My Device Is
Infected?
• Decreased performance
• Slow operation and function
• Poor battery life
• Device gets exceptionally hot for no reason
• Device turns on by itself
• Applications open / close on their own
• Downloaded items/apps without your permission
• Phone log shows calls you didn’t make
• Emails sent to unknown addresses
My Device Is Lost / Stolen! Now What?
• Ensure that you cannot find it
• Notify your organization’s IT Department
• Wipe the phone remotely via iCloud or other remote solutions
• Contact Law Enforcement
Simple Steps to Mobile Security
• Physical security – Know where your device is at!
• Use strong username and password controls
• Alphanumeric codes may be the best option
• Keep Operating System and Apps up-to-date
• Equip your device with Anti-malware software
• Turn Wi-Fi off when in public settings
• Do Not automatically join networks
• Wireless Hotspot for Laptops
• Encrypt your device
• Think when opening emails (social engineering)
• Set device to wipe contents after specified number of failed login attempts
Questions?
Tyler Wenger
• Helpdesk Technician
• Marketing Consultant
• Microsoft Technology Associate (MTA)
• TWenger@macpas.com
David Hammarberg
• Principal of Forensic Accounting
• Certified Fraud Examiner (CFE)
• Director of Information Technology
• CPA, MCSE, CISSP, CISA
• DHammarberg@macpas.com
Building Successful
Employee Relationships
A Cornerstone to Fraud Prevention
and Risk Management
Questions?
• Documents:
• https://www.nist.gov/cyberframework
• NIST Cybersecurity Framework website
• http://energy.gov/sites/prod/files/2014/03/f13/C2M2-v1-1_cor.pdf
• Maturity model
• https://www.sans.org/media/critical-security-controls/critical-controls-
poster-2016.pdf
• SANS Top 20 Critical Security Controls
Questions?
Tyler Wenger
• Helpdesk Technician
• Marketing Consultant
• Microsoft Technology Associate (MTA)
• TWenger@macpas.com
David Hammarberg
• Principal of Forensic Accounting
• Certified Fraud Examiner (CFE)
• Director of Information Technology
• CPA, MCSE, CISSP, CISA
• DHammarberg@macpas.com

More Related Content

What's hot

Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business InsecuritiesPing Identity
 
iOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowiOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowNowSecure
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient TruthAGILLY
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacycdunk12
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thUnited Technology Group (UTG)
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target 2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target Raleigh ISSA
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10William Mann
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...centralohioissa
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkBlue Coat
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 

What's hot (20)

Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
 
iOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowiOS and Android security: Differences you need to know
iOS and Android security: Differences you need to know
 
Trojan horseofbyod2
Trojan horseofbyod2Trojan horseofbyod2
Trojan horseofbyod2
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
10 things you should know about cybersecurity
10 things you should know about cybersecurity10 things you should know about cybersecurity
10 things you should know about cybersecurity
 
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target 2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 

Viewers also liked

2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 
어른을 위한 영어 말하기
어른을 위한 영어 말하기어른을 위한 영어 말하기
어른을 위한 영어 말하기Seyoung Choi
 
저축식당 2
저축식당 2저축식당 2
저축식당 2Ohyoon Kwon
 
김경옥 한국플랜트수출현황과 무역보험의 역할
김경옥 한국플랜트수출현황과 무역보험의 역할김경옥 한국플랜트수출현황과 무역보험의 역할
김경옥 한국플랜트수출현황과 무역보험의 역할KyoungOk Kim
 
Fingraph service guide_v0.1a_20120905
Fingraph service guide_v0.1a_20120905Fingraph service guide_v0.1a_20120905
Fingraph service guide_v0.1a_20120905syk1975
 
DreamSquare Pitch Deck
DreamSquare Pitch DeckDreamSquare Pitch Deck
DreamSquare Pitch Deckidreamsquare
 
취업성공을 위한 연애의 기술
취업성공을 위한 연애의 기술취업성공을 위한 연애의 기술
취업성공을 위한 연애의 기술Kenneth KIM
 
Road to spring 2
Road to spring 2Road to spring 2
Road to spring 2소현 김
 
시간, 공간 그리고 미디어
시간, 공간 그리고 미디어시간, 공간 그리고 미디어
시간, 공간 그리고 미디어SK Telecom
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
할인정보를 제공해 돈을 버는 비즈니스 - SALEr 사업계획서
할인정보를 제공해 돈을 버는 비즈니스 - SALEr 사업계획서할인정보를 제공해 돈을 버는 비즈니스 - SALEr 사업계획서
할인정보를 제공해 돈을 버는 비즈니스 - SALEr 사업계획서@hongss
 
기브앤테이크(Give and Take)
기브앤테이크(Give and Take)기브앤테이크(Give and Take)
기브앤테이크(Give and Take)현진 최
 
프로 세일즈맨의 커뮤니케이션 스킬은 따로 있다
프로 세일즈맨의 커뮤니케이션 스킬은 따로 있다프로 세일즈맨의 커뮤니케이션 스킬은 따로 있다
프로 세일즈맨의 커뮤니케이션 스킬은 따로 있다SP&S 컨설팅
 
R과 기초통계 : 01.자료다루기
R과 기초통계 : 01.자료다루기R과 기초통계 : 01.자료다루기
R과 기초통계 : 01.자료다루기Yoonwhan Lee
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryptionRK Nayak
 

Viewers also liked (20)

Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
어른을 위한 영어 말하기
어른을 위한 영어 말하기어른을 위한 영어 말하기
어른을 위한 영어 말하기
 
저축식당 2
저축식당 2저축식당 2
저축식당 2
 
Lcd
LcdLcd
Lcd
 
김경옥 한국플랜트수출현황과 무역보험의 역할
김경옥 한국플랜트수출현황과 무역보험의 역할김경옥 한국플랜트수출현황과 무역보험의 역할
김경옥 한국플랜트수출현황과 무역보험의 역할
 
Fingraph service guide_v0.1a_20120905
Fingraph service guide_v0.1a_20120905Fingraph service guide_v0.1a_20120905
Fingraph service guide_v0.1a_20120905
 
DreamSquare Pitch Deck
DreamSquare Pitch DeckDreamSquare Pitch Deck
DreamSquare Pitch Deck
 
취업성공을 위한 연애의 기술
취업성공을 위한 연애의 기술취업성공을 위한 연애의 기술
취업성공을 위한 연애의 기술
 
Road to spring 2
Road to spring 2Road to spring 2
Road to spring 2
 
시간, 공간 그리고 미디어
시간, 공간 그리고 미디어시간, 공간 그리고 미디어
시간, 공간 그리고 미디어
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
할인정보를 제공해 돈을 버는 비즈니스 - SALEr 사업계획서
할인정보를 제공해 돈을 버는 비즈니스 - SALEr 사업계획서할인정보를 제공해 돈을 버는 비즈니스 - SALEr 사업계획서
할인정보를 제공해 돈을 버는 비즈니스 - SALEr 사업계획서
 
기브앤테이크(Give and Take)
기브앤테이크(Give and Take)기브앤테이크(Give and Take)
기브앤테이크(Give and Take)
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
프로 세일즈맨의 커뮤니케이션 스킬은 따로 있다
프로 세일즈맨의 커뮤니케이션 스킬은 따로 있다프로 세일즈맨의 커뮤니케이션 스킬은 따로 있다
프로 세일즈맨의 커뮤니케이션 스킬은 따로 있다
 
R과 기초통계 : 01.자료다루기
R과 기초통계 : 01.자료다루기R과 기초통계 : 01.자료다루기
R과 기초통계 : 01.자료다루기
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 

Similar to Outside the Office: Mobile Security

BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom BainEC-Council
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020tmbainjr131
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 

Similar to Outside the Office: Mobile Security (20)

BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 

More from McKonly & Asbury, LLP

Ratio Analysis and Business Performance – Why Should I Care – Part 2?
Ratio Analysis and Business Performance – Why Should I Care – Part 2?Ratio Analysis and Business Performance – Why Should I Care – Part 2?
Ratio Analysis and Business Performance – Why Should I Care – Part 2?McKonly & Asbury, LLP
 
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...McKonly & Asbury, LLP
 
2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate
2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate
2019 State Taxes: Pennsylvania Update and The Multistate Tax ClimateMcKonly & Asbury, LLP
 
Leasing: A New Standard is Finally Here
Leasing: A New Standard is Finally HereLeasing: A New Standard is Finally Here
Leasing: A New Standard is Finally HereMcKonly & Asbury, LLP
 
Business Valuation Update & Impact of the Tax Cuts and Jobs Act
Business Valuation Update & Impact of the Tax Cuts and Jobs ActBusiness Valuation Update & Impact of the Tax Cuts and Jobs Act
Business Valuation Update & Impact of the Tax Cuts and Jobs ActMcKonly & Asbury, LLP
 
Tax Cut and Jobs Act: What You Need to Know
Tax Cut and Jobs Act: What You Need to KnowTax Cut and Jobs Act: What You Need to Know
Tax Cut and Jobs Act: What You Need to KnowMcKonly & Asbury, LLP
 
Business Ethics & The Three Monkeys in the Room
Business Ethics & The Three Monkeys in the RoomBusiness Ethics & The Three Monkeys in the Room
Business Ethics & The Three Monkeys in the RoomMcKonly & Asbury, LLP
 
Modern Trust Laws: Delivering Direction and Control
Modern Trust Laws: Delivering Direction and ControlModern Trust Laws: Delivering Direction and Control
Modern Trust Laws: Delivering Direction and ControlMcKonly & Asbury, LLP
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Professional Ethics for CPAs - What the Rules Say and How to Interpret Them
Professional Ethics for CPAs - What the Rules Say and How to Interpret ThemProfessional Ethics for CPAs - What the Rules Say and How to Interpret Them
Professional Ethics for CPAs - What the Rules Say and How to Interpret ThemMcKonly & Asbury, LLP
 
2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...
2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...
2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...McKonly & Asbury, LLP
 
Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...
Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...
Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...McKonly & Asbury, LLP
 
Navigating the new Trust Services Criteria
Navigating the new Trust Services CriteriaNavigating the new Trust Services Criteria
Navigating the new Trust Services CriteriaMcKonly & Asbury, LLP
 
Tax Credit Opportunities for Historic Building Rehabilitations
Tax Credit Opportunities for Historic Building RehabilitationsTax Credit Opportunities for Historic Building Rehabilitations
Tax Credit Opportunities for Historic Building RehabilitationsMcKonly & Asbury, LLP
 
Preparing to Buy? Topics and Tips for Buying a Business
Preparing to Buy? Topics and Tips for Buying a BusinessPreparing to Buy? Topics and Tips for Buying a Business
Preparing to Buy? Topics and Tips for Buying a BusinessMcKonly & Asbury, LLP
 
Data Analytics: Better Decision, Better Business
Data Analytics: Better Decision, Better BusinessData Analytics: Better Decision, Better Business
Data Analytics: Better Decision, Better BusinessMcKonly & Asbury, LLP
 
Tax Reform Legislation Analysis - Part 2
Tax Reform Legislation Analysis - Part 2Tax Reform Legislation Analysis - Part 2
Tax Reform Legislation Analysis - Part 2McKonly & Asbury, LLP
 
Preparing to Buy or Sell? Topics and Tips for a Successful Transition
Preparing to Buy or Sell? Topics and Tips for a Successful TransitionPreparing to Buy or Sell? Topics and Tips for a Successful Transition
Preparing to Buy or Sell? Topics and Tips for a Successful TransitionMcKonly & Asbury, LLP
 

More from McKonly & Asbury, LLP (20)

Ethics: A Focus on the 7 Threats
Ethics: A Focus on the 7 ThreatsEthics: A Focus on the 7 Threats
Ethics: A Focus on the 7 Threats
 
Ratio Analysis and Business Performance – Why Should I Care – Part 2?
Ratio Analysis and Business Performance – Why Should I Care – Part 2?Ratio Analysis and Business Performance – Why Should I Care – Part 2?
Ratio Analysis and Business Performance – Why Should I Care – Part 2?
 
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...
 
2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate
2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate
2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate
 
Leasing: A New Standard is Finally Here
Leasing: A New Standard is Finally HereLeasing: A New Standard is Finally Here
Leasing: A New Standard is Finally Here
 
Business Valuation Update & Impact of the Tax Cuts and Jobs Act
Business Valuation Update & Impact of the Tax Cuts and Jobs ActBusiness Valuation Update & Impact of the Tax Cuts and Jobs Act
Business Valuation Update & Impact of the Tax Cuts and Jobs Act
 
Tax Cut and Jobs Act: What You Need to Know
Tax Cut and Jobs Act: What You Need to KnowTax Cut and Jobs Act: What You Need to Know
Tax Cut and Jobs Act: What You Need to Know
 
Business Ethics & The Three Monkeys in the Room
Business Ethics & The Three Monkeys in the RoomBusiness Ethics & The Three Monkeys in the Room
Business Ethics & The Three Monkeys in the Room
 
Modern Trust Laws: Delivering Direction and Control
Modern Trust Laws: Delivering Direction and ControlModern Trust Laws: Delivering Direction and Control
Modern Trust Laws: Delivering Direction and Control
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Professional Ethics for CPAs - What the Rules Say and How to Interpret Them
Professional Ethics for CPAs - What the Rules Say and How to Interpret ThemProfessional Ethics for CPAs - What the Rules Say and How to Interpret Them
Professional Ethics for CPAs - What the Rules Say and How to Interpret Them
 
2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...
2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...
2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...
 
Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...
Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...
Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...
 
Navigating the new Trust Services Criteria
Navigating the new Trust Services CriteriaNavigating the new Trust Services Criteria
Navigating the new Trust Services Criteria
 
Tax Credit Opportunities for Historic Building Rehabilitations
Tax Credit Opportunities for Historic Building RehabilitationsTax Credit Opportunities for Historic Building Rehabilitations
Tax Credit Opportunities for Historic Building Rehabilitations
 
Preparing to Buy? Topics and Tips for Buying a Business
Preparing to Buy? Topics and Tips for Buying a BusinessPreparing to Buy? Topics and Tips for Buying a Business
Preparing to Buy? Topics and Tips for Buying a Business
 
Data Analytics: Better Decision, Better Business
Data Analytics: Better Decision, Better BusinessData Analytics: Better Decision, Better Business
Data Analytics: Better Decision, Better Business
 
Tax Reform Legislation Analysis - Part 2
Tax Reform Legislation Analysis - Part 2Tax Reform Legislation Analysis - Part 2
Tax Reform Legislation Analysis - Part 2
 
Tax Reform Legislation Analysis
Tax Reform Legislation AnalysisTax Reform Legislation Analysis
Tax Reform Legislation Analysis
 
Preparing to Buy or Sell? Topics and Tips for a Successful Transition
Preparing to Buy or Sell? Topics and Tips for a Successful TransitionPreparing to Buy or Sell? Topics and Tips for a Successful Transition
Preparing to Buy or Sell? Topics and Tips for a Successful Transition
 

Recently uploaded

Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesAurelien Domont, MBA
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverseSiemens
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAScathy664059
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfASGITConsulting
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Aggregage
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 

Recently uploaded (20)

Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and Templates
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverse
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdf
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 

Outside the Office: Mobile Security

  • 2. Building Successful Employee Relationships A Cornerstone to Fraud Prevention and Risk Management
  • 3. Building Successful Employee Relationships A Cornerstone to Fraud Prevention and Risk Management
  • 5. Introductions Tyler Wenger • Helpdesk Technician • Marketing Consultant • Microsoft Technology Associate (MTA) David Hammarberg • Principal of Forensic Accounting • Certified Fraud Examiner (CFE) • Director of Information Technology • CPA, MCSE, CISSP, CISA • 16+ years of experience
  • 6. Today’s Objective • To better understand mobile technologies, the threats that exist within a mobile / remote environment, how to avoid and thwart those threats, and to understand your role within mobile security.
  • 7. Why Is This Important? • Usage • Time • Accessibility • Money • Constantly Changing • Data! Data! Data!
  • 8. Takes Two To Be Secure • Proper Security measures need to be put in place by the IT department to keep mobile users secure. • Proper employee security training needs to be place.
  • 9. Agenda • An overview of the smartphone / tablet industry • An understanding of what mobile technologies are being used by small to medium size organizations • An understanding of the increased risk of mobile technology • An understanding of mitigation strategies for risks associated with mobile technologies. What is your mobility strategy? • Living in a mobile world: practical steps and real questions
  • 10. Mobile Technology • Smart Phones • Tablets • Laptops • Watches • BYOD
  • 11. Smartphone Statistics • Research estimates more than six billion smartphone users by 2020 • Over 50% of smartphone users grab their smartphone immediately after waking up • 84% of mobile users utilize the same smartphone for business and personal use • Mobile email opens have grown by 180% in the last three years • Mobile will likely account for 50% of all digital ad spend in 2016 (worth $100B) Data from https://www.impactbnd.com/blog/mobile-marketing-statistics-for-2016 and https://www.sophos.com/en- us/security-news-trends/security-trends/malware-goes-mobile.aspx
  • 12. Smartphones • All-In-One Devices • Super Computers • Limitless Mobility • Size • Physical security • Unique Operating Systems (OS) • Apple (iOS) • Android • Windows • Mobile Fragmentation • Susceptible to attacks • App Based, web-based, or SMS/Text Message-based
  • 13. Apple vs. Android • Android • Global popularity and open approach • Open source vs proprietary • Lack of control of its potential integrations • Apple • Control the entire ecosystem • Software, hardware, firmware • App Transport Security (ATS) • Secures user data sent via Apps • "The majority of enterprises still feel it is easier for them to secure their enterprise data on the iOS platform.” - Mobile Analyst Dionisio Zumerle
  • 14. 7 Tips for Smartphone Security 1. Use a PIN or Password 2. Download Apps only from trusted stores • Apple App Store • Google Play Store 3. Keep your Operating System and Apps Update 4. Log Out of sites / apps after completing transactions 5. Turn off Wi-Fi and Bluetooth when not in use 6. Backup your data 7. Avoid giving out personal information
  • 15. Secure Technology Options for Mobile Users • Citrix • VPN – Company to User • Cloud based – Connection to the Cloud Server • MDM – Mobile Device management Solutions
  • 16. What Are The Risks? • Data breach caused by: • Unsecure connections • Lost or stolen mobile devices • Unauthorized users • Compromised devices connecting to the network • Malware incident
  • 17. Three Most Common Mobile Security Breaches 1. Device loss / Theft • Theft of all pertinent data • Expensive international calls • In app purchases 2. Malware • Spam email contacts • Infect other devices • Harvest Passwords (secure password products?) 3. Unsecured Networks • Rogue Wi-Fi Networks • Tricks people into joining wrong network at airports, stations, or coffee shops • More common in Asia than in US / Europe
  • 18. Real Life Examples • Mobile phishing and ransomware • Using an infected mobile device to infiltrate nearby devices • Cross-platform banking attacks • Cryptocurrency mining attacks
  • 19. Mobility Driving Business and IT Change • Forcing organizations to have BYOD policy and plan; provide employee device choice • Anytime, anywhere, any device access now standard • Heightened importance of social business interactions • Need to factor in considerations across the business not just IT- HR, Legal, Security, Finance, Telco Plans.
  • 20. Mobile Security and Management • Protection of privacy and confidential information • Policies for client-owned smartphones and tablets • Visibility, security & management of mobile platform requirements
  • 21. Mobile Strategy Helps You Make The Right Choice 1. Understand current state and strategic direction. 2. Understand user profiles and their security requirements 3. Analyze gaps 4. Define recommendations and solution outline 5. Build road map
  • 22. Key Areas You Need to Address • Devices: Which device types and form factors should be supported and do I have a need for special types of devices? • Governance: What are the policies, guidelines and programs for mobile users and bring-your-own devices? (BYOD) • Support: What is the best way to support my users? • Mobile Applications: What mobile applications do I have today and what is the best way to roll out additional applications in the future? • IT Infrastructure: What tools do I need in place to allow me to effectively manage my mobile devices? • Network: What type of network access will my users require? Cellular Carrier? Corporate Wi-Fi? • Security: What security policies should be in place to ensure the safety of my corporate assets?
  • 23. Bring Your Own Device (BYOD) - Policy • What are you trying to achieve? • Define, document and publish your "Bring Your Own Device" (BYOD) Policy • You need input from a number of departmental functions: • IT • HR • Legal • Security • Finance • Your network carrier(s) • Entitlement • Which employees are eligible for business devices (Corporate liable)? • Which employees bring their own? • What data, functions, applications will be accessed? • Which devices will you support?
  • 24. Mobile Device Management (MDM) • Advanced mobile device management (MDM) functions are designed to enhance security and usability of mobile devices • Software that secures, monitors, manages and supports mobile devices • Over-the-air distribution of applications, data and configuration settings • Supports company-owned and employee-owned devices
  • 25. Dual Factor Authentication • Requires multiple factors for authentication • Uses multiple combinations of the following… • Something you know (username, password, PIN, etc.) • Something you have (smartphone, Token Device, key fab, etc.) • Something you are (fingerprint, retinal scan, voice recognition, etc.) • Requires an extra step, but “an ounce of prevention is worth a pound of cure.”
  • 26. Dual Factor Vendors • Duo Security • RSA SecurID - Tokens
  • 27. Security Awareness • Employees are the largest risk to the organization. • Employees can circumvent the best security policies. • What is your organization doing to train your employees?
  • 30. How Do I Know If My Device Is Infected? • Decreased performance • Slow operation and function • Poor battery life • Device gets exceptionally hot for no reason • Device turns on by itself • Applications open / close on their own • Downloaded items/apps without your permission • Phone log shows calls you didn’t make • Emails sent to unknown addresses
  • 31. My Device Is Lost / Stolen! Now What? • Ensure that you cannot find it • Notify your organization’s IT Department • Wipe the phone remotely via iCloud or other remote solutions • Contact Law Enforcement
  • 32. Simple Steps to Mobile Security • Physical security – Know where your device is at! • Use strong username and password controls • Alphanumeric codes may be the best option • Keep Operating System and Apps up-to-date • Equip your device with Anti-malware software • Turn Wi-Fi off when in public settings • Do Not automatically join networks • Wireless Hotspot for Laptops • Encrypt your device • Think when opening emails (social engineering) • Set device to wipe contents after specified number of failed login attempts
  • 33. Questions? Tyler Wenger • Helpdesk Technician • Marketing Consultant • Microsoft Technology Associate (MTA) • TWenger@macpas.com David Hammarberg • Principal of Forensic Accounting • Certified Fraud Examiner (CFE) • Director of Information Technology • CPA, MCSE, CISSP, CISA • DHammarberg@macpas.com
  • 34. Building Successful Employee Relationships A Cornerstone to Fraud Prevention and Risk Management
  • 35. Questions? • Documents: • https://www.nist.gov/cyberframework • NIST Cybersecurity Framework website • http://energy.gov/sites/prod/files/2014/03/f13/C2M2-v1-1_cor.pdf • Maturity model • https://www.sans.org/media/critical-security-controls/critical-controls- poster-2016.pdf • SANS Top 20 Critical Security Controls
  • 36. Questions? Tyler Wenger • Helpdesk Technician • Marketing Consultant • Microsoft Technology Associate (MTA) • TWenger@macpas.com David Hammarberg • Principal of Forensic Accounting • Certified Fraud Examiner (CFE) • Director of Information Technology • CPA, MCSE, CISSP, CISA • DHammarberg@macpas.com

Editor's Notes

  1. This is what we hope each of you gets out of this webinar. This is the mission and the goal. As we go throughout this webinar I will be giving more of a personal approach to mobile security while Dave will be looking through the lens of an organization and how organizational management approaches mobile security.
  2. Users are spending more time, using more devices, doing more things, accessing more data and spending more money on mobile devices than ever before and that trend looks like it will continue for the foreseeable future. Marketers are pouring money into mobile advertising, developers are spending lots of money on app development, and that’s why Apple and Google consistently are the two most valuable companies in the world. If there is money involved, you can bet that hackers, phishers, and cyber attackers will be playing in that space as well. People are becoming mobile and if you, your organization, or your vendors are not ready you could experience some serious problems. This industry is constantly changing, adapting, moving forward. Must be prepared for what is going on now as well as what is going to come in the next 5-10 years. For sake of this presentation, we are going to focus on what is going on now. Most important reason is to secure data. Hackers are trying to get your data (SSN, EIN, Address, Phone Number, Credit card Number, bank account information, usernames, passwords, etc.)
  3. Devices always change People always bringing new devices into the network 20 years ago computers as phones would have been unthinkable, 10 years ago a computer as a watch would have been hard to believe. But where will we go next? I know Under Armour and some other athletic fashion wear companies are investing in wearable technology. I wouldn’t be surprised in 3-7 years you put on a t-shirt and you can view apps, heart rate, other biometric information right from your sleeve. Mobile technology is constantly evolving
  4. I just want to go over a few interesting statistics that I found and briefly discuss why I think each of these is important and how it applies to today’s webinar. 6 Billion users – mass quantity = plenty of opportunities for hackers and attackers to do what they want to do 50% when wake up – around us 24/7. using them, typing on them, calling on them, streaming music on them, they never leave our side. 84% important for organizations as more and more users meshing personal and business devices….I would think that’s also similar to laptops for personal and business use Mobile email opens – if I’m an attacker I am salivating at this statistic, more changes for social engineering and to phish end users into clicking on bad links which is why social engineering is extremely important. 100B – important because again there is a lot of money in this realm and attackers are trying to make money
  5. All In One Devices – Used as a phone, to send text messages, to take pictures, stream and play music, to browse the internet, as a GPS, to control temp / lighting in your house, can edit videos, check email, scan documents, see where your friends and family are at that exact moment, save and access info to secure cloud storage, access bank account information / deposit a check, now with NFT can be used as a payment solution (Apple Pay), and the list goes on and on. This makes the security of these devices extremely important. Limitless mobility – use them at work, in your car, in your bed, on the toilet, at a concert, etc. there is no limit to where you can use these devices. Makes physical security challenging. OS - Mobile device fragmentation is a phenomenon that occurs when some mobile users are running older versions of an operating system, while other users are running newer versions.
  6. Studies have found that a much larger percentage of mobile malware targets Android over iOS, the software that runs Apple’s devices. That’s primarily due to Android’s huge global popularity and its open approach. Much easier to try and “hack” via an app or Android software than on iOS. App Transport Security, or ATS, is a feature that Apple debuted in iOS 9. When ATS is enabled, it forces an app to connect to web services over an HTTPS connection rather than HTTP, which keeps user data secure while in transit by encrypting it. The “S” in HTTPS helpfully stands for secure and you’ll often see it appear in your browser when logging into your banking or email accounts. But mobile apps often aren’t as transparent with users about the security of their web connections, and it can be hard to tell whether an app is connecting via HTTP or HTTPS. Enter ATS, which is enabled by default for iOS 9. However, developers can still switch ATS off and allow their apps to send data over an HTTP connection — until the end of this year, that is. (For technical crowd: ATS requires TLS v 1.2, with exceptions for already encrypted bulk data, like media streaming.) Apple originally set the mandate for Apps to be in compliance with ATS HTTPS for January 1, 2017 > date has been extended and last I heard they had not set a new compliance date Apple securely controls which apps are available on its App Store, strictly reviewing all apps to avoid allowing malware through **After all, it only takes one piece of perfectly formed iOS malware to do as much damage as thousands of copycat Android threats. And both platforms are equally at risk from social engineering, where hackers use more personal methods to target your logins and data. A multitude of threats to Android could be greatly eliminated if all users upgraded their mobile phones to the latest version of the OS. The inconsistency of Android devices across old versions plays into the hands of malware creators, so it’s crucial to keep your own devices up to date. Apple does not have the same problem, as each release of iOS quickly reaches its users, due to the fact that iOS updates are big events that prompt mass upgrades. This means that consequential security scares are rare enough to be big news when they occur. While there are drawbacks to Apple’s tight grip over everything that occurs on its OS, there’s no doubt it makes for a more secure environment for casual users. Overall, Apple has more of an overarching defense against threats. Android is more of the Wild-West, but with the right safeguards and good decision making (installing trusted apps, having an app that runs security analysis for threats, etc.) Android can be secure as well
  7. 2. Use a pin, password or pattern to lock your phone Setting this up is easy. For most Android™ devices, go to your Location & Security Settings for instructions. iOS users can find these functions in the General options of their settings. 3. Download apps only from trusted stores If you’re browsing for a new game or something more productive, use places such as Google Play™. Make sure you check ratings and reviews if they are available, and read the app’s privacy policy to see exactly what phone features it will have access to if you download. 4. Back up your data This is more about protecting and restoring your information should disaster strike. With Backup Assistant Plus and Verizon Cloud, you can save your contacts, music, pictures, videos and documents to the cloud. 5. Keep your operating system and apps updated There are typically periodic updates to both of these that not only add new features, but also offer tightened security. 6. Log out of sites after you make a payment If you bank or shop from your smartphone, log out of those sites once your transactions are complete. Other tips include not storing your usernames and passwords on your phone and avoiding transactions while you are on public Wi-Fi. 7. Turn off Wi-Fi and Bluetooth® when not in use You think of them as ways to connect to something, but thieves can use them to connect to your device and access files. 8. Avoid giving out personal information That text message that looks to be from your bank may not be. If you get requests via email or text for account information from any business, contact the business directly to confirm the request. The same advice goes for tapping links in unsolicited emails or texts
  8. Question: Safe to connect to public Wi-Fi? Starbucks, Panera, airport, stores, etc.?
  9. Just like the PC scams, bad guys are using social engineering through mobile apps and SMS text messages, which take advantage of human behavior and trust to gain access to data or infiltrate businesses, to make people click on links. Malware then ends up on the user’s PC. “If they can make you believe a message is from a trusted source, chances are you will click,” says Stu Sjouwerman, cofounder of security training company KnowBe4 LLC in Clearwater, Fla. “This trick has been used with email, instant messaging, social networks, and [now] they are even spoofing SMS text messages.” Even email messages, when opened on a mobile device, can infect laptops and enterprise systems. Sjouwerman advises mobile users to check for red flags. “If you click on an email message from a mobile app without checking for anything suspicious, you might download malware and infect your PC, so think before you click!” When working inside a company to identify vulnerabilities, pentester and mobile security expert Georgia Weidman recently asked herself from a hacker’s perspective, “wouldn’t it be nice if we could just walk into the network with a compromised phone and have direct network access” by way of a client side attack or social engineering.  She concluded that in many cases you can. “An infected mobile device allows you to breach an organization's perimeter and directly attack the devices on the network instead of having to break in some other way, you've already got direct network access,” Weidman says. Consider a simple scenario.  An Android device has been infected with the Smartphone-Pentest-Framework, or SPF Agent. The unsuspecting user thinks it’s an official news app, for instance, and thinks nothing of it, but it is also communicating with an SPF console that’s giving thieves access to mobile device data.  That device is sharing Wi-Fi with the laptop sitting nearby, and the thief is also able to breach the laptop, which contains company information or access to corporate systems. “If I have control of their mobile devices, I can go the traditional route like stealing their contacts or sending text messages to a premium number, but also if the device is connected to a Wi-Fi network I can attack additional systems on that network from the infected phone,” she explains. “Whether I’m connected to my home Wi-Fi, work Wi-Fi or Starbucks Wi-Fi, if there are any devices with vulnerabilities on that network, I can potentially exploit them directly from the infected mobile device.”  Gangs are also using malware on PCs to infiltrate mobile phones in hybrid attacks on user’s banking accounts, according to John Shier, security advisor at Sophos.  A piece of malware dropped on the user’s laptop can detect when the user is surfing his banking website. Dubbed a “man in the browser” attack – the spying is all done in browser memory “so they can intercept your banking credentials before they get encrypted and sent across the wire,” he explains.  Adding to the scam, thieves put up a warning message, such as “for increased security, download this app,” and they ask for the user’s phone number and email address to send an SMS to their phone or to download a link.  “You click on the SMS and download the app, and they basically own your desktop and your phone,” he says. Wondering why your mobile device is losing battery power too quickly or why it feels overheated? You might have cryptocurrency mining malware on your device. The malware infiltrates mobile devices in search of digital currencies, like Bitcoin, Litecoin and Dogecoin.  Found mostly in Android devices, the apps were injected in many cases with the CPU mining code from a legitimate Android cryptocurrency mining app. The miner is started as a background service once it detects that the affected device is connected to the internet.  By default, it launches the CPU miner to connect to a dynamic domain, which then redirects to an anonymous digital currency mining pool. “The reality is that the capabilities on the phone aren’t as great as they are in a big server or mainframe attacks,” says Kohavi. “But it’s a trial and error for these organized criminals to be able to put their foot into an area and then leverage that and see what they can get out of it.” Now transition into organizational perspective of mobile technology and how a mobile strategy can help your organization
  10. You are saying you should have an actual document?
  11. Dave highlight some possible security awareness solutions
  12. Difficult to truly determine but here are a few possible factors that may inform you that you have malware or some sort of virus on your device. Applies to laptops, smartphones, tablets, etc.
  13. Difficult to truly determine but here are a few possible factors that may inform you that you have malware or some sort of virus on your device. Applies to laptops, smartphones, tablets, etc.
  14. Difficult to truly determine but here are a few possible factors that may inform you that you have malware or some sort of virus on your device. Applies to laptops, smartphones, tablets, etc.
  15. Find My iPhone and other apps / tracking tokens can help track your device. Make sure it isn’t trapped under the sofa  Can use remote tools to wipe your phone remotely Should be handled with law enforcement as if it was your purse or wallet (if stolen)
  16. Alphanumeric – combines letters and numbers so it is more secure. Don’t make it easy “Tylerwenger1” A few ideas: mix letters of something meaningful with numbers that you will remember Physical security – everything below won’t matter if you don’t know where your device is located or who has access to it Password managers (LastPass, Keeper, Dashlane, 1Password, TrueKey, etc.) Antimalware software – especially important for Android users Wife – in iOS Settings > Wi-Fi > bottom option to ask to join networks Can swipe up from the bottom of the screen at anytime and click the Wi-Fi icon to turn it off Wireless Hotspot to tether your computer and phone (coffee shop)…will use data so be smart, but more secure than joining the public Wi-Fi. Encrypt: Software for laptops, iTunes can encrypt a backup Wipe after failed login attempts: can be managed by MDM or organizational management solutions
  17. Can I actually get Malware or a virus on my iPhone? A = Virtually impossible for malware or a virus to penetrate iOS due to Apple’s proprietary nature and the security of their system. It is possible something could get onto your iPhone, but through a web browser would be the only real way, Apps protected by ATS and by Apple’s unwillingness for open source developing.