Beyond WiFi: Securing Your Mobile Devices Eric Dover Information Technology Assistance Center (iTAC) Kansas State University Thursday, October 8, 2009 Where are we going? A look at common security concerns with mobile devices including laptops Tips to secure your devices and keep your data safe Questions and open sharing time Thursday, October 8, 2009 Common Security Concerns Do you know what data is on your device? Sensitive emails Sensitive documents Financial information Thursday, October 8, 2009 Common Security Concerns ComputerWeekly.com “Four million mobile phone users risk ID theft” Ian Grant March 18, 2009 Credant Technologies security survey in the UK: •Found 80% of phone users store information on their phones that criminals could use to steal their identities Four in 10 of commuters surveyed said they do not password-protect their phones Business information on phones: •Business e-mails (35%) •Business contacts (77%) •Work diaries (30%) •Corporate documents and spreadsheets (17%) •Customer information (23%). Personal information on phones: •Bank account details (16%) •Pins and passwords (24%) •Social security and inland revenue details (11%) •Store credit card information (10%). Thursday, October 8, 2009 Common Security Concerns Personal privacy - Identity theft Third party applications Open and free wireless access Theft Support while traveling Thursday, October 8, 2009 Tips to stay safe For mobile devices Setup a password or passcode to access device Encrypt your information Don’t store any more information than you need Keep a close eye on your mobile device Thursday, October 8, 2009 Tips to stay safe Features to look for when buying Remote delete capability Encryption Password protection Easy to understand Thursday, October 8, 2009 Tips to stay safe Keeping data safe when using Avoid any sensitive activity over open WiFi Try to keep to cellular data Consider buying a MiFi device or high speed cellular modem for other devices Use a VPN connection Thursday, October 8, 2009 Tips to stay safe Physical security Use a lock on the laptop Never leave unattended Lock in safe Keep doors locked Consider a netbook for travel Thursday, October 8, 2009 Tips to stay safe If equipment is lost or stolen Computrace or LoJack for laptops and netbooks Remote delete capabilities Report to mobile company ASAP Contact the police Keep a record of serial numbers and MAC addresses Whole disc encryption - PGP Thursday, October 8, 2009 Tips to stay safe Things to consider Have a strict mobile device security policy Consider device management software or systems BlackBerry Enterprise Server LANDesk System Center Configuration Manager Reimage computers that have been to some countries Educate, educate, educate Thursday, October 8, 2009 Questions and Open Sharing Thursday, October 8, 2009