Click me
Transcribed

Why You Should Care About Mobile Security

WHY YOU SHOULD CARE ABOUT MOBILE SECURITY SIMPLE THINGS YOU CAN DO TO PROTECT YOURSELF AND YOUR ORGANIZATION FROM TODAY'S MOBILE COMPUTING THREATS CRIMINALS MAY NOT HAVE PHYSICAL ACCESS TO YOUR DEVICE BUT CAN STILL CRACK ITS SENSITIVE AND BYOD IS A BUSINESS TREND THAT'S HERE TO STAY. CONFIDENTIAL DATA. Meet Joe Worker Meet Joe IT WORK BENEFITS OF MOBILE DEVICES BOOST PRODUCTIVITY WITH ACCESS ALLOW US TO WORK STORE LARGE AMOUNTS OF DATA AND PROVIDE A GATEWAY TO THE REST OF THE ORGANIZATION TO APPS, EMAIL AND INTERNET ON THE MOVE MOBILE DEVICES ARE INHERENTLY INSECURE • DEVICES CAN BE LOST OR STOLEN IT SPECIALISTS ARE WORRIED DEVICE USERS ARE OFTEN • INFORMATION CAN BE STOLEN OVER ABOUT INSECURE DEVICES UNEDUCATED ABOUT RISKS AND WIRELESS NETWORKS HOW TO SECURE DEVICES • MOBILE MALWARE WE LOVE OUR GADGETS 40 BILLION Estimation of how many apps have been downloaded from 3.1 BILLION the Apple iTunes store and Android Marketplace Estimated number of mobile broadband I BILLION subscribers by 2015 Mobile devices activated by the end of 2012 40 MILLION Tablets sold in less 42% than 2 years Smartphone Market Growth from 2010 to 2011 RECENT MOBILE DEVICE BREACHES EMPLOYEES BELIEVE THAT NOBODY ATTACKS MOBILE PHONES. IN REALITY, SMARTPHONES ARE EASY TARGETS FOR HACKERS. 51% 59% 174 Million records were stolen in of organizations have had data loss due to of organizations experienced an increase in malware infection due 855 data breaches? insecure devices' to insecure mobile devices? COST OF Average cost of a breach is $194 $5.5M PER RECORD1 MALICIOUS APPS THE SECURITY CONTROLS THAT THE APP MARKETPLACES HAVE IN PLACE TO VET THE SAFETY OF THEIR OFFERINGS ARE WOEFULLY INADEQUATE SOME APPS MAY HAVE HIDDEN SPYWARE PHISHING SCREENS MALWARE BACKGROUND PROCESSES 10 TIPS TO SECURE YOUR MOBILE GADGETS USE PASSWORD PROTECTED WIPE DEVICES DATA AUTOMATICALLY ACCESS CONTROLS IF LOST OR STOLEN CONTROL WIRELESS NEVER STORE PERSONAL FINANCIAL NETWORK AND SERVICE DATA ON YOUR DEVICE CONNECTIVITY CONTROL APPLICATION BEWARE OF FREE APPS ACCESS AND PERMISSIONS free 4 KEEP YOUR OS AND TRY MOBILE ANTIVIRUS SOFTWARE FIRMWARE CURRENT OR SCANNING TOOLS 10 MDM USE MOBILE DEVICE MANAGEMENT BACK UP YOUR DATA (MDM) SOFTWARE IF RECOMMENDED BY IT FOR MORE INFORMATION ON THIS SUBJECT VERACODE DOWNLOAD OUR FREE EBOOK "Why should i care? Mobile security for the rest of us" https://info.veracode.com/ebook-download.html ADDITIONAL SOURCES 1.-http://www.prnewswire.com/news-releases/survey-says-51-percent-of-organizations-lose-data-through-mobile-devices-59-perc ent-of-employees-dodge-security-controls-140850593.html 2.- http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012-press_en_xg.pdf 3.- Cisco

Why You Should Care About Mobile Security

shared by Neostrategos on Oct 11
950 views
3 shares
0 comments
The BYOD revolution. You’ve heard of it, you know it’s coming, some believe it’s already here. Is it inevitable? Will it change the way we do business? No matter what you believe, you need to un...

Publisher

Veracode

Source

Unknown. Add a source

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size