400 likes | 549 Views
Tech It Up a Notch Mobile Device Security. 2013 MAP TechWorks, a program of MAP for Nonprofits. Where did this presentation come from?. MAP TechWorks, a program of MAP for Nonprofits, is devoted to helping nonprofits use technology to unleash mission.
E N D
Tech It Up a NotchMobile Device Security 2013 MAP TechWorks, a program of MAP for Nonprofits
Where did this presentation come from? • MAP TechWorks, a program of MAP for Nonprofits, is devoted to helping nonprofits use technology to unleash mission. • Our "Tech It Up a Notch" series is designed to help nonprofit staff learn about and discuss technology to increase knowledge, and help people feel more comfortable talking about technology together. • Learn more at MAPTechWorks.org 2012 MAP TechWorks, a program of MAP for Nonprofits
Objective Practical ways to keep the data on your mobile devices secure.
Overview • Security Settings • Scams • Software • Backup • Privacy • Device Management
From the PC world Same best practices apply • Use strong passwords • Don’t enter passwords on shared PCs • Use trusted Wi-Fi
Cautions & Disclaimers • Not all devices are the same • You can brick your device • I am not a security expert • Use common sense • Security v. Usability • No Silver Bullet • Focus on iOS & Android
Owner Info • What to do if your phoneis found • Provide alternate contactinfo
Encrypt Storage • Slows performance • A one-way street • Takes up to an hour to encrypt
Smishing • Text messages • Lure you to give info • Unsolicited
Apps • Read the reviews • Look for a trust mark • Beware of too good to betrue
Mobile Antivirus • Anti-theft features • App scanning • URL scanning • Backup • Generally useless
Privacy & Social Media • Connecting apps • App permissions • Installing apps • Liking • Connecting • Location sharing
Android Device Manager • Reset PIN • Ring Device • Lock Device • Locate on a map • Remotely wipe • Remotely remove account • Remotely provision Wifi Networks • Set password rules • Set encryption • Disable cameras
Action Steps • Configure security settings • Assist others you work with • Build a security-aware culture • Establish a Bring Your Own Device Policy