1 / 12

Beyond WiFi: Securing Your Mobile Devices

Beyond WiFi: Securing Your Mobile Devices. Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University. Where are we going?. A look at common security concerns with mobile devices including laptops Tips to secure your devices and keep your data safe

lali
Télécharger la présentation

Beyond WiFi: Securing Your Mobile Devices

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Beyond WiFi: Securing Your Mobile Devices • Thomas Kuhn • Information Technology Assistance Center (iTAC) • Kansas State University

  2. Where are we going? • A look at common security concerns with mobile devices including laptops • Tips to secure your devices and keep your data safe • Questions and open discussion

  3. Common Security Concerns • Do you know what data is on your device? • Sensitive emails • Sensitive documents • Financial information • Personal privacy • Open and free wireless access

  4. Common Security Concerns • Theft • Support while traveling • Unprotected network connections • Nosey applications and features

  5. Tips to stay safe • For mobile devices • Setup a password or passcode to access device • Encrypt your information • Don’t store any more information than you need • Warning on storing information on internal data cards • Keep a close eye on your mobile device

  6. Tips to stay safe • Applications and features gone bad • Keep an eye on geotagging apps and phone “features” • Read the privacy policy. You may be amazed at what you are authorizing the app to collect • Free is rarely free.

  7. Tips to stay safe • Features to look for when buying • Remote delete capability • Encryption • Password protection • Easy to understand

  8. Tips to stay safe • Keeping data safe when using • Try to keep to cellular data • Avoid any sensitive activity over open WiFi • Use a VPN client • Consider buying a MiFi device or high speed cellular modem for other devices

  9. Tips to stay safe • If equipment is lost or stolen • Computrace or LoJack for laptops and netbooks • Remote delete capabilities • Report to mobile company ASAP • Contact the police • Keep a record of serial numbers and MAC addresses • Whole disc encryption

  10. Tips to stay safe • Physical security • Use a lock on the laptop • Never leave unattended • Lock in safe • Keep doors locked • Consider a netbook for travel

  11. Questions & Open Discussion

  12. Thank You

More Related