1 / 40

Tech It Up a Notch Mobile Device Security

Tech It Up a Notch Mobile Device Security. 2013 MAP TechWorks, a program of MAP for Nonprofits. Where did this presentation come from?. MAP TechWorks, a program of MAP for Nonprofits, is devoted to helping nonprofits use technology to unleash mission.

dori
Download Presentation

Tech It Up a Notch Mobile Device Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Tech It Up a NotchMobile Device Security 2013 MAP TechWorks, a program of MAP for Nonprofits

  2. Where did this presentation come from? • MAP TechWorks, a program of MAP for Nonprofits, is devoted to helping nonprofits use technology to unleash mission. • Our "Tech It Up a Notch" series is designed to help nonprofit staff learn about and discuss technology to increase knowledge, and help people feel more comfortable talking about technology together. • Learn more at MAPTechWorks.org 2012 MAP TechWorks, a program of MAP for Nonprofits

  3. Objective Practical ways to keep the data on your mobile devices secure.

  4. Your Data is Not Safe

  5. Overview • Security Settings • Scams • Software • Backup • Privacy • Device Management

  6. From the PC world Same best practices apply • Use strong passwords • Don’t enter passwords on shared PCs • Use trusted Wi-Fi

  7. What’s at Stake

  8. Cautions & Disclaimers • Not all devices are the same • You can brick your device • I am not a security expert • Use common sense • Security v. Usability • No Silver Bullet • Focus on iOS & Android

  9. Security Settings

  10. Screen Auto-Lock

  11. Screen Auto-Lock

  12. Owner Info • What to do if your phoneis found • Provide alternate contactinfo

  13. Owner Info

  14. Encrypt Storage • Slows performance • A one-way street • Takes up to an hour to encrypt

  15. Encrypt Storage

  16. Encrypt Storage

  17. Encrypt Storage

  18. Scams

  19. Smishing • Text messages • Lure you to give info • Unsolicited

  20. Phishing

  21. Operating Systems

  22. Apps • Read the reviews • Look for a trust mark • Beware of too good to betrue

  23. Apps

  24. Apps

  25. Mobile Antivirus • Anti-theft features • App scanning • URL scanning • Backup • Generally useless

  26. If All Else Fails

  27. Data Backup

  28. Privacy & Social Media • Connecting apps • App permissions • Installing apps • Liking • Connecting • Location sharing

  29. Facebook Apps

  30. Facebook Apps

  31. Remote Device Management

  32. Find my iPhone

  33. Android Device Manager • Reset PIN • Ring Device • Lock Device • Locate on a map • Remotely wipe • Remotely remove account • Remotely provision Wifi Networks • Set password rules • Set encryption • Disable cameras

  34. Android Device Manager

  35. Google Apps

  36. Action Steps • Configure security settings • Assist others you work with • Build a security-aware culture • Establish a Bring Your Own Device Policy

More Related