Mobile Devices in the Enterprise

Download Report

Transcript Mobile Devices in the Enterprise

MOBILE DEVICES & THEIR
IMPACT IN THE ENTERPRISE
Michael Balik
Assistant Director of Technology
Perkiomen Valley School District
Agenda






What are mobile devices?
General information
Policies and procedures
Security
Where to go from here
Questions
Mobile Devices



SMART Phones – including the iPhone, Blackberry,
Windows Mobile and Android based devices
Tablets – including the iPad, Windows tablets,
Samsung Galaxy Tab
Thumb drives – no interface on device but still stores
data
General Information




Sales of mobile devices (excluding flash drives) to
surpass the sale of computers in 2011
Mobile devices have legitimate business value
What is the impact on the organization if mobile
device assess is unavailable?
How critical are mobile users and applications to
the organization?
Policies & Procedures







Absolute must have
Acceptable use policy, other policies, or both
Personally owned devices versus company owned
devices
Who is responsible for damage to company devices
Data breach policies
Know what is on devices – email, student data,
financial data, special ed data, personal data, etc.
Know what can be accessed
Security






Must always remember the best security is only as
good as the weakest vulnerability
Mobile devices are the most vulnerable entry point
for malware and threats
Different types of threats
Why to be concerned
No one is immune
Weigh security versus usefulness
Security – Human Threats




Theft / Loss
Poor decisions
Passwords
Screen locks
Security – Other Threats




Public wi-fi and cellular networks
Cameras
Viruses and other threats on cloud servers
Hacking, spying, stealing, transmitting, recording
calls
Security – How to Reduce Risk






Encryption
Backup of critical device data
Authorization of devices
Audits of devices
Layers of security are critical
Best way to reduce risk is to know what is a risk
Where to go next?





Mobile devices are here to stay – and growing
Will always be evolving
Need to effectively support while balancing the
risks and security threats
Continue to refine and improve policies
Implement infrastructure that can help to keep
devices secure and productive
Questions

Questions? Comments? Thoughts? Experience?
Contact
Mike Balik
Assistant Director of Technology
Perkiomen Valley School District
[email protected]