DOC PREVIEW
Mobile Device Security Training

This preview shows page 1-2-3-4-5 out of 16 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Mobile Device Security TrainingAustin PolleyInformation Technology Assistance Center (iTAC)Kansas State UniversityWhy Focus on Mobile DeviceWhy Focus on Mobile Device Security?y• Idea of being just a “phone”gj p• Smaller size• Increased mobility• Increased functionality• ValueWh i ?Where are we going?• A look at common security concerns with mobile devicesdevices• Tips to secure your devices and keep your data safepy py• What to do when security is compromised• Questions and open discussionSitCSecurity ConcernsPhysical Access•Physical Access•Staying safe while using deviceStaying safe while using device• What to do before/after you lose your phonePh i l APhysical Access• Always keep track of your mobile device• Never leave it unattended for any amount of time• Don’t leave it in the care of others• When storing your device, you can never be too safeSt i l k d bi t d i ffi•Store in locked cabinet or drawer in officePh i l APhysical Access• Check what security settings your device hasPi b d i tt l k•Pin number, password, swipe pattern unlock features• Wipe phone after x amount of failed login attempts• Belt clips can be problematic, carry it securely• Choose to leave phone at home when you don’t need itStaying safe while usingStaying safe while using device•Avoid public or open WIFI hotspots•Avoid public or open WIFI hotspots.• Use mobile data connection: tethering, mobile hotspot g, petc• Use a VPN ClientTurn off unnecessary features•Turn off unnecessary featuresStaying safe while usingStaying safe while using device• Only keep the files you need• Virtual Credit Card Numbers• Reporting location in social networks can be dangerousMalicious contentMalicious content•Newer threat especially to Android Devices•Newer threat, especially to Android Devices•Apps collect user data, spam contact list, etcApps collect user data, spam contact list, etc• Read about the developer, read reviews, don’t assume anythingR d P i i b f i t lli A k t•Read Permissions before installing, App markets can be open and vulnerable.• Don’t allow apps from unknown sources, 3rdparty AppstoresAppstores.Mlii t tMalicious content• What’s the answer to android viruses?• Android antiviruses of course!• Many Popular AVs now have an android versionPttiMPreventative Measures• Making preventative steps is the only way…• Smartphones have find my phone, remote wipe, remote lock, remote “scream” abilities. Many 3rdparty optionsVaries for each device learn what yours is capable•Varies for each device, learn what yours is capable of• Find the solution that you think will work best for you and test it.PttiMPreventative Measures• Encryptionyp• Not all devices have it, even less have it as a built in function and even fewer than that implement it well.Blackberry is known for good encryption•Blackberry is known for good encryption•Reports that iphone encryption is poor, almost noReports that iphone encryption is poor, almost no encryption on android. Possibility for this to change.If your device is lost or stolenIf your device is lost or stolen•Use any systems you had in place to:•Use any systems you had in place to:• Find your phone, make sure it didn’t just get left at yp , jgwork• If its been stolen, remote wipe it if you canDevice has to have some type of connection to•Device has to have some type of connection to receive commands.• Contact Law enforcement and cell carrier.Qti &O Di iQuestions & Open DiscussionTh k YThank


Mobile Device Security Training

Download Mobile Device Security Training
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Mobile Device Security Training and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Mobile Device Security Training 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?