120 likes | 322 Views
Mobile Devices & Their Impact in the Enterprise. Michael Balik Assistant Director of Technology Perkiomen Valley School District. Agenda. What are mobile devices? General information Policies and procedures Security Where to go from here Questions. Mobile Devices.
E N D
Mobile Devices & Their Impact in the Enterprise Michael Balik Assistant Director of Technology Perkiomen Valley School District
Agenda • What are mobile devices? • General information • Policies and procedures • Security • Where to go from here • Questions
Mobile Devices • SMART Phones – including the iPhone, Blackberry, Windows Mobile and Android based devices • Tablets – including the iPad, Windows tablets, Samsung Galaxy Tab • Thumb drives – no interface on device but still stores data
General Information • Sales of mobile devices (excluding flash drives) to surpass the sale of computers in 2011 • Mobile devices have legitimate business value • What is the impact on the organization if mobile device assess is unavailable? • How critical are mobile users and applications to the organization?
Policies & Procedures • Absolute must have • Acceptable use policy, other policies, or both • Personally owned devices versus company owned devices • Who is responsible for damage to company devices • Data breach policies • Know what is on devices – email, student data, financial data, special ed data, personal data, etc. • Know what can be accessed
Security • Must always remember the best security is only as good as the weakest vulnerability • Mobile devices are the most vulnerable entry point for malware and threats • Different types of threats • Why to be concerned • No one is immune • Weigh security versus usefulness
Security – Human Threats • Theft / Loss • Poor decisions • Passwords • Screen locks
Security – Other Threats • Public wi-fi and cellular networks • Cameras • Viruses and other threats on cloud servers • Hacking, spying, stealing, transmitting, recording calls
Security – How to Reduce Risk • Encryption • Backup of critical device data • Authorization of devices • Audits of devices • Layers of security are critical • Best way to reduce risk is to know what is a risk
Where to go next? • Mobile devices are here to stay – and growing • Will always be evolving • Need to effectively support while balancing the risks and security threats • Continue to refine and improve policies • Implement infrastructure that can help to keep devices secure and productive
Questions • Questions? Comments? Thoughts? Experience?
Contact Mike Balik Assistant Director of Technology Perkiomen Valley School District mbalik@pvsd.org