Beyond WiFi: Securing Your Mobile Devices Eric Dover Information Technology Assistance Center (iTAC)

advertisement
Beyond WiFi: Securing
Your Mobile Devices
Eric Dover
Information Technology Assistance Center (iTAC)
Kansas State University
Thursday, October 8, 2009
Where are we going?
A look at common security concerns with
mobile devices including laptops
Tips to secure your devices and keep your data
safe
Questions and open sharing time
Thursday, October 8, 2009
Common Security
Concerns
Do you know what data is on your device?
Sensitive emails
Sensitive documents
Financial information
Thursday, October 8, 2009
Common Security
Concerns
ComputerWeekly.com “Four million mobile phone users risk ID theft” Ian
Grant March 18, 2009
Credant Technologies security survey in the UK:
•Found 80% of phone users store information on their phones that criminals could use to steal their identities
Four in 10 of commuters surveyed said they do not password-protect their phones
Business information on phones:
•Business e-mails (35%)
•Business contacts (77%)
•Work diaries (30%)
•Corporate documents and spreadsheets (17%)
•Customer information (23%).
Personal information on phones:
•Bank account details (16%)
•Pins and passwords (24%)
•Social security and inland revenue details (11%)
•Store credit card information (10%).
Thursday, October 8, 2009
Common Security
Concerns
Personal privacy - Identity theft
Third party applications
Open and free wireless access
Theft
Support while traveling
Thursday, October 8, 2009
Tips to stay safe
For mobile devices
Setup a password or passcode to access
device
Encrypt your information
Don’t store any more information than you
need
Keep a close eye on your mobile device
Thursday, October 8, 2009
Tips to stay safe
Features to look for when buying
Remote delete capability
Encryption
Password protection
Easy to understand
Thursday, October 8, 2009
Tips to stay safe
Keeping data safe when using
Avoid any sensitive activity over open WiFi
Try to keep to cellular data
Consider buying a MiFi
device or high speed
cellular modem for
other devices
Use a VPN connection
Thursday, October 8, 2009
Tips to stay safe
Physical security
Use a lock on the laptop
Never leave unattended
Lock in safe
Keep doors locked
Consider a netbook for travel
Thursday, October 8, 2009
Tips to stay safe
If equipment is lost or stolen
Computrace or LoJack for laptops and
netbooks
Remote delete capabilities
Report to mobile company ASAP
Contact the police
Keep a record of serial numbers and MAC
addresses
Whole disc encryption - PGP
Thursday, October 8, 2009
Tips to stay safe
Things to consider
Have a strict mobile device security policy
Consider device management software or
systems
BlackBerry Enterprise Server
LANDesk
System Center Configuration Manager
Reimage computers that have been to some
countries
Educate, educate, educate
Thursday, October 8, 2009
Questions and Open
Sharing
Thursday, October 8, 2009
Download