Pace IT - Secure Mobile Devices

12
Secure the mobile device.

Transcript of Pace IT - Secure Mobile Devices

Secure the mobile device.

Page 2

Instructor, PACE-IT Program – Edmonds Community College

Areas of expertise Industry Certifications

PC Hardware

Network Administration

IT Project Management

Network Design

User Training

IT Troubleshooting

Qualifications Summary

Education

M.B.A., IT Management, Western Governor’s University

B.S., IT Security, Western Governor’s University

Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions.

Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.

Brian K. Ferrill, M.B.A.

Page 3

Secure the mobile device.PACE-IT.

– Secure against loss or theft.

– Secure against malware.

Page 4

Secure against loss or theft.Secure the mobile device.

Page 5

Since the inception of the mobile device, loss and theft have been a concern.

Just about everyone has either lost a mobile device or had one stolen. In the early years, the major concern was that your cell phone was going to be used to call some foreign country or toll number and you would get stuck with a large bill. Now, with the advent of smart phones, tablets, and the portability of data, much more may be at stake.

Secure against loss or theft.Secure the mobile device.

Page 6

Secure against loss or theft.Secure the mobile device.

– First line of defense.» Passcode locks: usually a four-digit code that must be

entered to unlock the phone.» Failed login restrictions: a user-determined action

(erase data) that occurs after so many failed login attempts.

» Locator applications: uses GPS and geotracking to pinpoint the location of the device, especially useful in cases of theft.

» Remote backup applications: backing up data is always crucial.

– Last line of defense.» Remote wipe: many phone and mobile devices are

set up to receive a signal from the user that will wipe the device remotely in case the device is unrecoverable.

» Remote backup applications: backing up data is always crucial!

Page 7

Secure against malware.Secure the mobile device.

Page 8

As technology progresses, more and more malware is being developed for the mobile device.

Originally there was not much demand for malware on the mobile device; after all, what were you going to get? Again, with the rise of the smart phone and tablet, the stakes have become much higher.

Secure against malware.Secure the mobile device.

Page 9

Secure against malware.Secure the mobile device.

– First line of defense.» User education: teach and practice safe habits.» Patching/OS updates: keeping your device’s

operating system up to date can mitigate many threats and vulnerabilities and helps to reduce the threat of malware.

» Trusted source: only acquire apps from trusted sources; be aware that not all apps are created equal. The user is more likely to receive malware from an Android app than an Apple app.

» Remote backup application: backing up data is always crucial.

– Second line of defense.» Antivirus: as the popularity of mobile devices has

increased so has the market for antivirus. Unfortunately, given the nature of mobile devices, the antivirus product almost has to be specifically tailored for each operating system, device, and sometimes even the service provider. Do your research before installing an antivirus app.

Page 10

What was covered.Secure the mobile device.

Passcode locks, login restrictions, locator applications, and frequent backups are all first line defensive measures that should be taken. If all else fails, there is always the remote wipe option. If you have to resort to this, hopefully your backups are current.

Topic

Secure against loss or theft.

Summary

Safe mobile device habits, keeping the OS current, only installing apps from trusted sources, and frequent backup are your first line of defense. Antivirus apps are an option; however, due to the nature of mobile computing, they can be rather specific. Do your research before installing.

Secure against malware.

Page 11

THANK YOU!

This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53.

PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.