Click me
Transcribed

Mobile Security Infestation

F// MOBILE SECURITY /I INFESTATION HOW WE ENJOY OUR MOBILE DEVICES OF AMERICAN ADULTS... 90% 58% 42% 32% OWN A OWN A CELL PHONE SMART PHONE OWN A OWN A E-READER TABLET COMPUTER WHAT MAKES MOBILE SO POPULAR? Easy access to email, apps, and Storage for important data wifi BYOD options for the workplace A connection to the The ability to work on the go ever-expanding human network BUT THAT ENJOYMENT HAS SOME UNWELCOME COUNTERPARTS of all the world's internet 15% traffic is an active cyberattack INTERNET HACKERS ARE... 90% 9.9% 0.1% WORLDCLASS CYBERCRIMINALS 1 IN 20 computers are infected. AMATEURS FOR HIRE IN 2013, THE TOP TARGETS FOR CYBERHACKING WERE 14% 23% FINANCE GOVERNMENTS 7% - ORGANIZATIONS 22% INDUSTRY 6% NEWS 00 20% OTHERS 3% EDUCATION INDIVIDUALS HACKERS ARE ALREADY VERY GOOD AT WHAT THEY DO Cyberattacks cost the US $70 BILLION EACH YEAR Don't make it easier for them by leaving yourself open to attack! THE DANGERS OF MOBILE APPS Users expect mobile apps to be vetted and trustworthy, but there are more than 500 third-party app stores containing malicious apps: SPYWARE MALWARE PHISHING UNWANTED COOKIES Android is responsible for 99% of a mobile malware. THE DANGERS OF WORKING ON THE GO FREE WIFI NETWORK "HOTSPOTS" ARE EASY TO ACCESS AND EASY TO HACK! THIS INCLUDES: 1 dan't care 64% of those who use Coffee Shops Airport Terminals Libraries an unsecure wireless network say they have little to no concern about using them. BUT UNSECURED WIFI HOTSPOTS Guest networks for businesses Unsecured home ARE ONE OF THE LEADING and college campuses networks SOURCES OF IDENTITY THEFT! THE DANGERS OF BYOD WHEN EMPLOYEES WERE ASKED IF THEIR ORGANIZATIONS HAD EXPERIENCED A DATA BREACH DUE TO INSECURE DEVICES: 51% YES STORING COMPANY INFORMATION ON THE DEVICE ENTRUSTS SECURITY TO THE INDIVIDUAL USERS 55% 26% NO 23% NOT SURE of organizations have no guidelines in place for their employees' mobile device usage PROTECTING YOURSELF AND YOUR MOBILE DEVICE KEEP A CLEAN HOUSE Password ****** Don't store any personal financial information on your Manage App Access PASSWORD PROTECT EVERYTHING! Don't use the same password for everything, and use passwords with complicated letters and numbers. Always check reviews for Apps before you Keep OS and firewalls ******* EVACUATE FOR DECONTAMINATION ..*****. Backup all data to the Cloud Wipe lost or stolen devices automatically BRING IN THE EXTERMINATORS Switch your phone systems over to VolP (Voice over Internet Protocol) for better call encryption >Install a Mobile Security App • Use mobile antivirus software Consult IT in dealing with vital company data WHAT'S TO COME FOR MOBILE SECURITY? 2015 2016 00 277 MILLION MOBILE DEVICES WILL HAVE SOME KIND OF PROTECTION INSTALLED COSTING MOBILE USERS A COLLECTIVE $3 BILLION $3.6 BILLION .- 69% of this investment will be made by corporations to protect data will be spent on mobile security DON'T JUST REACT TO SECURITY BREACHES; TAKE THE STEPS TO KEEP THE INFESTATION AWAY. PROTECT YOUR MOBILE DEVICES TODAY! SOURCES http://csciwww.etsu.edu/gotterbarn/stdntppristats.htm http:/focus.forsythe.com/articles/282/5-Mobile-Security-Threats http://www.pewinternet.org/facts-heets/mobile-technology fact sheet/ http://hackmageddon.com/2014/01/19/2013-cyber-attacks statistics-summary http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats/amobilemalware http://www.tollfreeforwarding.com/blog/your-cell-phone-is-not-as-secure-as-you-think/ http://www.digitaltrends.com/mobile/study-reveals-americans-lost-30-billion-of-mobile-phones-last-yearie13OM6F http://www.privatewifi.com/fast-free-and-out-of-control-why-wifi-users disconnect-from -wireless security-risks at hotspots/ E gryffin.

Mobile Security Infestation

shared by gryffin on Aug 27
72 views
0 share
0 comments
There's a dark side to everything, even your beloved mobile phone and all of the business you can get done on the go with it. Here's a quick and easy guide to ensuring your mobile experience remains f...

Publisher

Gryffin Media

Source

Unknown. Add a source

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size