1 / 12

Mobile Devices & Their Impact in the Enterprise

Mobile Devices & Their Impact in the Enterprise. Michael Balik Assistant Director of Technology Perkiomen Valley School District. Agenda. What are mobile devices? General information Policies and procedures Security Where to go from here Questions. Mobile Devices.

jaguar
Download Presentation

Mobile Devices & Their Impact in the Enterprise

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Devices & Their Impact in the Enterprise Michael Balik Assistant Director of Technology Perkiomen Valley School District

  2. Agenda • What are mobile devices? • General information • Policies and procedures • Security • Where to go from here • Questions

  3. Mobile Devices • SMART Phones – including the iPhone, Blackberry, Windows Mobile and Android based devices • Tablets – including the iPad, Windows tablets, Samsung Galaxy Tab • Thumb drives – no interface on device but still stores data

  4. General Information • Sales of mobile devices (excluding flash drives) to surpass the sale of computers in 2011 • Mobile devices have legitimate business value • What is the impact on the organization if mobile device assess is unavailable? • How critical are mobile users and applications to the organization?

  5. Policies & Procedures • Absolute must have • Acceptable use policy, other policies, or both • Personally owned devices versus company owned devices • Who is responsible for damage to company devices • Data breach policies • Know what is on devices – email, student data, financial data, special ed data, personal data, etc. • Know what can be accessed

  6. Security • Must always remember the best security is only as good as the weakest vulnerability • Mobile devices are the most vulnerable entry point for malware and threats • Different types of threats • Why to be concerned • No one is immune • Weigh security versus usefulness

  7. Security – Human Threats • Theft / Loss • Poor decisions • Passwords • Screen locks

  8. Security – Other Threats • Public wi-fi and cellular networks • Cameras • Viruses and other threats on cloud servers • Hacking, spying, stealing, transmitting, recording calls

  9. Security – How to Reduce Risk • Encryption • Backup of critical device data • Authorization of devices • Audits of devices • Layers of security are critical • Best way to reduce risk is to know what is a risk

  10. Where to go next? • Mobile devices are here to stay – and growing • Will always be evolving • Need to effectively support while balancing the risks and security threats • Continue to refine and improve policies • Implement infrastructure that can help to keep devices secure and productive

  11. Questions • Questions? Comments? Thoughts? Experience?

  12. Contact Mike Balik Assistant Director of Technology Perkiomen Valley School District mbalik@pvsd.org

More Related