SlideShare uma empresa Scribd logo
1 de 13
Gold Lock 3G Encryption Mobile Information Security Best Practices Primer
Summary The purpose of this Gold Nugget is to outline the basics of Mobile Information Security (MIS). It should be noted from the start that all the encryption, anti-malware, and company policy will not prevent 100% of information loss.  These practices are based on the honest efforts off employees to protect their company's sensitive information.  Intentional release of information is difficult, if not impossible, to prevent especially on mobile devices.
Training and Policy A clear understanding of your company's MIS policies will help prevent accidental information loss and also provide a frame work for investigating information loss. Resources: www.cissp.com www.auerbach-publications.com
Passwords The cell phone should be password protected if that feature is available. The password should block all access the device until a valid password is enabled. The password used should be as strong a password as technologically possible. Guidance on creating strong passwords can be found  here
Reporting Compromised Devices In the event your device is lost, stolen, misplaced, is suspected to be such, it should be reported to your  IT department.  Recovered devices should be taken to your IT department a cell phone dealer immediately for more information on checking for and removing spyware.
Storing Information Sensitive or restricted data should never be stored on a cell phone, unless it can be encrypted. Keep in mind that encryption is no good if strong passwords are not effectively put into place and used.
Transmission Security/Encryption Where possible, data transmissions from a cell phone should be encrypted. Hackers and corrupt carrier employees are able to intercept your conversations while in transit between devices and use/sell the information they steal.  Encrypting your transmissions keeps the information from being useful as easily.  The stronger encryption the  less useful  the information because of the effort to decrypt. Gold Lock 3G has the most robust encryption on the market, and is compatible with the most devices and networks .  www.gold-lock.com
Wireless Access/Bluetooth Wireless access, such as Ethernet, Bluetooth, etc., to the cell phone should be disabled when not in use to prevent unauthorized wireless access to the device. These should  never  be used when speaking about sensitive topics over your mobile device.  It defeats the purpose of encrypting transmissions from the cell phone.  Interception happens at the un-encrypted Bluetooth transmission and not the encrypted transmission from the phone
Wireless Access/Bluetooth In general, keep your wireless connection on hidden mode unless you specifically need to be visible to others. Wireless access should be configured to query the user for confirmation before connecting to wireless networks. For example, when Bluetooth is on, select the “check with me before connecting” option to prevent automatic connections with other devices.
Malware Malware comes in the form of spyware on mobile devices (smart phones in particular).  Spyware can be installed with or without physical access to the device. Exercise caution when accepting applications sent via wireless or opening SMS attachments as they may include software harmful to your cell phone.
Malware Capabilities ,[object Object]
Emails
SMS

Mais conteúdo relacionado

Último

Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 

Último (20)

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 

Destaque

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Mobile Security Best Pract Gold Nugget

  • 1. Gold Lock 3G Encryption Mobile Information Security Best Practices Primer
  • 2. Summary The purpose of this Gold Nugget is to outline the basics of Mobile Information Security (MIS). It should be noted from the start that all the encryption, anti-malware, and company policy will not prevent 100% of information loss. These practices are based on the honest efforts off employees to protect their company's sensitive information. Intentional release of information is difficult, if not impossible, to prevent especially on mobile devices.
  • 3. Training and Policy A clear understanding of your company's MIS policies will help prevent accidental information loss and also provide a frame work for investigating information loss. Resources: www.cissp.com www.auerbach-publications.com
  • 4. Passwords The cell phone should be password protected if that feature is available. The password should block all access the device until a valid password is enabled. The password used should be as strong a password as technologically possible. Guidance on creating strong passwords can be found here
  • 5. Reporting Compromised Devices In the event your device is lost, stolen, misplaced, is suspected to be such, it should be reported to your IT department. Recovered devices should be taken to your IT department a cell phone dealer immediately for more information on checking for and removing spyware.
  • 6. Storing Information Sensitive or restricted data should never be stored on a cell phone, unless it can be encrypted. Keep in mind that encryption is no good if strong passwords are not effectively put into place and used.
  • 7. Transmission Security/Encryption Where possible, data transmissions from a cell phone should be encrypted. Hackers and corrupt carrier employees are able to intercept your conversations while in transit between devices and use/sell the information they steal. Encrypting your transmissions keeps the information from being useful as easily. The stronger encryption the less useful the information because of the effort to decrypt. Gold Lock 3G has the most robust encryption on the market, and is compatible with the most devices and networks . www.gold-lock.com
  • 8. Wireless Access/Bluetooth Wireless access, such as Ethernet, Bluetooth, etc., to the cell phone should be disabled when not in use to prevent unauthorized wireless access to the device. These should never be used when speaking about sensitive topics over your mobile device. It defeats the purpose of encrypting transmissions from the cell phone. Interception happens at the un-encrypted Bluetooth transmission and not the encrypted transmission from the phone
  • 9. Wireless Access/Bluetooth In general, keep your wireless connection on hidden mode unless you specifically need to be visible to others. Wireless access should be configured to query the user for confirmation before connecting to wireless networks. For example, when Bluetooth is on, select the “check with me before connecting” option to prevent automatic connections with other devices.
  • 10. Malware Malware comes in the form of spyware on mobile devices (smart phones in particular). Spyware can be installed with or without physical access to the device. Exercise caution when accepting applications sent via wireless or opening SMS attachments as they may include software harmful to your cell phone.
  • 11.
  • 13. SMS
  • 14. Audio
  • 15. Video
  • 17.
  • 20. Device behaves as a bug. Can see and hear surrounding conversations.
  • 21. Anti-Malware Just as with PCs, smart phones have anti-malware software available. This software prevents and detects malware on your smart phone keeping conversations secure when using or around it. When joined with a strong transmission encryption software, like Gold Lock, your conversations are more secured from your microphone to the receiver's speaker. The Sigillu Total Security Phone provides this complete security and more.
  • 22. Conclusion This has been a short presentation to educate you on the general aspects of Mobile Information Security and alert you as to vulnerabilities of mobile devices. For more information please contact us at: [email_address] 954-376-5715 Ext 101 – Dealer Sales Ext 103 – End User Sales