1 of 9

Slide Notes

Secure your own device before you bring your new phone or tablet to the office.

Please take a moment to learn how to protect your device from being hacked! Your 'IT guy' will give you high-fives for understanding these mobile security tips!
DownloadGo Live

6 Tips for BYOD Security

Published on Nov 18, 2015

Personal BYOD Security Tips

PRESENTATION OUTLINE

Beware of Hackers

6 Tips How-To Secure Your Device
Secure your own device before you bring your new phone or tablet to the office.

Please take a moment to learn how to protect your device from being hacked! Your 'IT guy' will give you high-fives for understanding these mobile security tips!
Photo by dustball

Hacking Personal & Work Data

IT worries about intellectual data being in the wrong hands! 
IT understands that employees want to bring their devices to work. They are mostly for BYOD! However, IT has to make sure corporate data is not compromised. The next 6 slides are tips on learning how to secure your personal device.
Photo by bryankennedy

#1 must-do

And change your password frequently
#1 Never, really never give out your password. Once someone has access to your password, they have all the access you have!

#2 Change your password, get creative: catrocket7, fastsnail4...

Photo by hugovk

defense

Autolock your device, set 5 minutes autolock
1 in 4 adults have their device stolen or lost in a year. Password feature is the first defense to protect your data. Best practice is to set your device autolock feature to 5 minutes.

update, Update, update

App developers frequently update their software to fix security gaps!  
Hackers look for vulnerabilities in apps or software that run on devices. App developers and device manufacturers frequently update their software to fix security threats. Updating your device every time a new update comes out will help keep hackers at bay.
Photo by muckingfajic

Beware of public wifi

Do not make purchases on free WiFi. This is where hackers look for devices!
Starbucks, McDonalds, and public WiFis are where hackers prey on unsecure devices as they are watching WiFi network traffic. Never give out any personal information on a web page when on a free WiFi!

bluetooth Enabled

Don't leave "Discoverable Mode" - a hacker opportunity.
Bluetooth threats are not too dangerous, but can be very serious. The most serious hacking on Bluetooth is Bluebugging. Attackers will remotely access user's phone/device and use its features, including listening to calls, forwarding incoming calls, placing calls and sending text messages. This could result in very expensive data bills.

download apps you trust

Malicious apps can steal your data, credit card info to hijack your device!
Applications as simple as a game or weather app can contain software that can steal your personal data to hijack your device. Make sure you are downloading apps from a reputable app store. Double check the app for reviews!

Photo by MarcelaPalma

BYOD with workspot

All of Your Business Apps and Documents in One Spot!
Workspot is an app that IT runs to securely deliver work applications and documents on to your personal device. All the apps are in one single workspace, so there's no need to remember multiple passwords, IT doesn't control your device they just manage the Workspot app!

Free pilot of 10 users for 60 days. Find out more @ http://www.workspot.com/end-user-features/