SlideShare uma empresa Scribd logo
1 de 66
MOBILE
DEVICES in the
WORKPLACE:
            ur ity
         S  ec
    K ey ks:
  5     R is
meet
CRISTIANO
CRISTIANO is a business man
…and a trivia man
C r i st ia n o ,
Hey
           U KN       OW…
DI D YO
…in 2011, Dubliners left
thousands of personal
items in taxis such as …
as
  et o
         fF
          AL
            SE
                 TE
                    ET
                       H
GS
       DO
     o
tw
C AT
o ne
a few   TOILET SEATS
SH ES
     a lA
 un er
f
an
   d   aB
        AB
          Y
I al most
Oh ! And
forgo t. . .
25,000E PHONES
MOBIL
And that’s just in DUBLIN
Many of those lost devices can store:




10K 20K 200K 500K
PHOTOS WORD DOCS EMAILS       CONTACTS
That’s a lot of
SENSITIVE INFO!
Cristiano, Imag
                ine
if YOUR PHON
                 E
   landed in the
  wrong hands?
Just think about
                 how much
  CORPORATE
                  D A TA
     would be at risk
                      ?
CRISTIANO’S
Confidential
Client Info..
And p
        hysica
is just        l acce
        one ty        ss
SE C U         pe of
       R I TY
              TH R E
                     AT!
Wait, there
are more?
Sadly, YES.
             In fact there
 5 K EY S E CU             are
               RITY RISKS
   everyone mu
                  st know.
Communication
Interception
Look
Familiar?
Think back, wh
                en was the
last time you a
                ccessed a
     Wi-Fi hot spot
                    ?
Hmm, where
  was I?
For companies with employees
    who use Wi-Fi hotspots




   … the stakes are high!
Malicious
 Code
Malware
          attacks a
no longe            re
        r confine
                  d to
       PCs!
In fact,
malwa      mobile
      re thre
  on the      a t s ar e
          rise…
..and continue to
 affect the most
    prevalent
      mobile
    operating
     systems
Here
        ’s an
 fact f       inter
        or yo        estin
in 201        u Cr i       g
        1…           stiano
                            ,
Before
After
w that’s
Wo     ng!
shocki
Device
Attacks
Device atta
                  cks are
typically de
              signed to g
 control of th           a in
              e device an
    access cont           d
                  ent…
…or attempt
a denial of
service
(DOS).
DEVICE ATTACKS
are similar to PC
ATTACKS of the
past, such as…
Browser-based attacks



  Buffer overflow
  expectations




Application-based
attacks
l
      ca
    si s
  y s
Ph c e
  Ac
Cristiano, ar
              en’t Mobile
 Devices the
                perfect
  travel compa
                 nion?
I mean they are…
small
portable
and lightweight.
But that also means,
     they are…

    1. Easy to steal.
   2. Leave behind.
and rem   ember
Oh ,
     th is slide?
25 ,000             S
 MO   BILE PHONE
                      in
left in t axis in Dubl
          alone!
ew  hat
Ah, I se     re.
     did the
y ou      er d og.
Y ou clev
Insider Threats
Threa
     t s c an
 from         also c
        withi        ome
  organ       n you
          isatio     r
                 n.
Malicious
 insiders can
  use mobile
  devices to
leak important
     data.
Sharing corporate
information from a
 smartphone will..
..often circumvent
 robust monitoring
 systems, like Data
  Loss Prevention.
al ly?
 Re       y?
   rio usl
Se
no, REALLY!
Yes Cr   istia
Lets revie   w t he 5 Key
 S e cu r ity Risks one
       more time.
Whether or not your
  company has formall
                      y
adopted mobile devi
                    ces…
They are in your
enterprise.
So what should
   YOU do?
Voice Engineer Ireland

           1 244 9590
 Phon e: 0
                n@v  ei.ie
    l: nla niga
Emai                land
         : @V EI r e
  Tweet
Sounds good
   to m e .

Mais conteúdo relacionado

Semelhante a Mobile Device Management - Bring Your Own Device

Protect smartphone from hackers
Protect smartphone from hackersProtect smartphone from hackers
Protect smartphone from hackersAndrew
 
Tom Purves: Designing for An Augmented Reality World
Tom Purves: Designing for An Augmented Reality WorldTom Purves: Designing for An Augmented Reality World
Tom Purves: Designing for An Augmented Reality WorldRefresh Events
 
Designing for an Augmented Reality world
Designing for an Augmented Reality worldDesigning for an Augmented Reality world
Designing for an Augmented Reality worldthomas.purves
 
The Web Under Our Skin - digital trends for 2015
The Web Under Our Skin - digital trends for 2015The Web Under Our Skin - digital trends for 2015
The Web Under Our Skin - digital trends for 2015Bart De Waele
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison
 
#MobileRevolution: How Mobile Is (Still) Changing The World
#MobileRevolution: How Mobile Is (Still) Changing The World#MobileRevolution: How Mobile Is (Still) Changing The World
#MobileRevolution: How Mobile Is (Still) Changing The WorldAlexandre Jubien
 
#MobileRevolution - How Mobile Is Changing You
#MobileRevolution - How Mobile Is Changing You#MobileRevolution - How Mobile Is Changing You
#MobileRevolution - How Mobile Is Changing YouAlexandre Jubien
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James EC-Council
 
Customer Worthy 2012 Customer Experience Forecast
Customer Worthy 2012 Customer Experience ForecastCustomer Worthy 2012 Customer Experience Forecast
Customer Worthy 2012 Customer Experience ForecastClient X Client
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped futureMichael Renner
 
Friction and sustainability
Friction and sustainabilityFriction and sustainability
Friction and sustainabilitytidelift
 
Friction and sustainability monkigras 2018
Friction and sustainability   monkigras 2018Friction and sustainability   monkigras 2018
Friction and sustainability monkigras 2018Amy Guyer
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneHasani Jaali
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemsHacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemskhalavak
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 

Semelhante a Mobile Device Management - Bring Your Own Device (20)

People the biggest cyber risk
People the biggest cyber riskPeople the biggest cyber risk
People the biggest cyber risk
 
Protect smartphone from hackers
Protect smartphone from hackersProtect smartphone from hackers
Protect smartphone from hackers
 
Tom Purves: Designing for An Augmented Reality World
Tom Purves: Designing for An Augmented Reality WorldTom Purves: Designing for An Augmented Reality World
Tom Purves: Designing for An Augmented Reality World
 
Designing for an Augmented Reality world
Designing for an Augmented Reality worldDesigning for an Augmented Reality world
Designing for an Augmented Reality world
 
The Web Under Our Skin - digital trends for 2015
The Web Under Our Skin - digital trends for 2015The Web Under Our Skin - digital trends for 2015
The Web Under Our Skin - digital trends for 2015
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 final
 
#MobileRevolution: How Mobile Is (Still) Changing The World
#MobileRevolution: How Mobile Is (Still) Changing The World#MobileRevolution: How Mobile Is (Still) Changing The World
#MobileRevolution: How Mobile Is (Still) Changing The World
 
#MobileRevolution - How Mobile Is Changing You
#MobileRevolution - How Mobile Is Changing You#MobileRevolution - How Mobile Is Changing You
#MobileRevolution - How Mobile Is Changing You
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Customer Worthy 2012 Customer Experience Forecast
Customer Worthy 2012 Customer Experience ForecastCustomer Worthy 2012 Customer Experience Forecast
Customer Worthy 2012 Customer Experience Forecast
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped future
 
Friction and sustainability
Friction and sustainabilityFriction and sustainability
Friction and sustainability
 
Friction and sustainability monkigras 2018
Friction and sustainability   monkigras 2018Friction and sustainability   monkigras 2018
Friction and sustainability monkigras 2018
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemsHacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 

Mobile Device Management - Bring Your Own Device