SlideShare a Scribd company logo
1 of 7
Download to read offline
BYOD
	 and mobile
security
over a
coffee
BYOD and mobile security over a coffee
Mobile phones and tablets have become both professional tools
and status symbols. As more and more of us carry these must-
have devices wherever we go, their security has emerged as a
major challenge to both manufacturers and traditional security
developers.
So in a developing, diverse market that isn’t (yet) immune to
unexpected disaster, what challenges does a Bring Your Own
Device (BYOD) culture have in store for companies? What exactly
is at risk when you lose your phone? And, lastly, what security
devices can combine personal and professional use? These are
some of the questions we will try to answer during this coffee
break!
We hope you enjoy reading this, and we’ll see you soon on our
blogs!
Philippe Macia
editorial
2
content
in search of...lost smartphones
don’t touch my BYOD!
mobile security: wrapper or container?
3 BYOD and mobile security over a coffee
4
in search of... lost smartphones
BYOD and mobile security over a coffee
in search of... lost
smartphones
by Vincent Maurin
What happens when a smartphone without a security system
is left in the middle of an urban jungle? Experts from Symantec
have tried to answer this question with the “Smartphone Honey
Stick” project.
the honey pot
In cooperation with Perspective Inc., Symantec researchers
had the (bad?) idea of “losing” 50 smartphones in the middle
of five major North American cities: New York, Washington DC,
Los Angeles, San Francisco and Ottawa. Abandoned in busy
public spaces, the 50 smartphones contained applications that
tracked their location and use.
Since smartphones hold valuable personal and professional
information, the Symantec researchers were interested to see
how people who stumbled across the devices would behave.
“lost” smartphones
The 50 smartphones had no security system (password, etc).
As stated in “The Symantec Smartphone Honey Stick Project”,
the study aimed to analyze “human threats” to phones. It was
designed to determine the probability that the finder of a device
would:
• unlock the phone (and the time it would take to do so)
• access professional data and applications
in search of... lost smartphones
BYOD and mobile security over a coffee5
• access personal data and applications
• access applications depending on type
• return the smartphone to its owner
• take the smartphone with him/her (and the time it would take
to do so)
The researchers assumed that the finder would access the
phone’s data or applications for one of the following reasons:
• identifying or locating the owner to return the device
• reading content for curiosity’s sake
• researching valuable information
• using it personally (calls, Internet access)
• resetting the phone for resale or reuse
rigged applications and data
Every smartphone had a set of improperly functioning
applications with easy-to-understand names and icons.
Source : Symantec Smartphone Honey Stick Project
BYOD and mobile security over a coffee
Our blog :
http://www.orange-business.com/en/blogs/connecting-technology
download
the entire
document at
http://oran.ge/19EuaO0free
6
Orange,French“anonymoussociety”(S.A.)withanoperatingcapitalof10,595,541,532,78rueOlivierdeSerres–75015Paris–380129866RCSParis

More Related Content

Viewers also liked

communications unifiées - orange business
communications unifiées - orange businesscommunications unifiées - orange business
communications unifiées - orange business
Orange Business Services
 

Viewers also liked (6)

Get well, stay well with m-health
Get well, stay well with m-healthGet well, stay well with m-health
Get well, stay well with m-health
 
M2M is smart
M2M is smartM2M is smart
M2M is smart
 
communications unifiées - orange business
communications unifiées - orange businesscommunications unifiées - orange business
communications unifiées - orange business
 
Orange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakoutOrange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakout
 
[FR] la normalisation du cloud en un éclair preview
[FR] la normalisation du cloud en un éclair preview[FR] la normalisation du cloud en un éclair preview
[FR] la normalisation du cloud en un éclair preview
 
[infographic] multichannel CRM: going with the flow
[infographic] multichannel CRM: going with the flow[infographic] multichannel CRM: going with the flow
[infographic] multichannel CRM: going with the flow
 

More from Orange Business Services

More from Orange Business Services (20)

OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
 
Asia-Pacific: smart mobility for the public sector with Orange
Asia-Pacific: smart mobility for the public sector with Orange Asia-Pacific: smart mobility for the public sector with Orange
Asia-Pacific: smart mobility for the public sector with Orange
 
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificDriving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
 
How to deliver faster AI insights while safeguarding data security and privacy?
How to deliver faster AI insights while safeguarding data security and privacy? How to deliver faster AI insights while safeguarding data security and privacy?
How to deliver faster AI insights while safeguarding data security and privacy?
 
Building the connected Supply Chain – how digital is transforming Asia-Pacific
Building the connected Supply Chain – how digital is transforming Asia-PacificBuilding the connected Supply Chain – how digital is transforming Asia-Pacific
Building the connected Supply Chain – how digital is transforming Asia-Pacific
 
How digital is transforming financial services in Asia Pacific
How digital is transforming financial services in Asia Pacific How digital is transforming financial services in Asia Pacific
How digital is transforming financial services in Asia Pacific
 
Digitally transforming the Asia Pacific building construction industry
Digitally transforming the Asia Pacific building construction industryDigitally transforming the Asia Pacific building construction industry
Digitally transforming the Asia Pacific building construction industry
 
SDN/NFV: Create a network that’s ahead of your business
SDN/NFV: Create a network that’s ahead of your businessSDN/NFV: Create a network that’s ahead of your business
SDN/NFV: Create a network that’s ahead of your business
 
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
 
World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...
 
Orange Data Centre and Cloud
Orange Data Centre and CloudOrange Data Centre and Cloud
Orange Data Centre and Cloud
 
Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?
 
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
 
Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...
 
Digitally transforming transport and logistics
Digitally transforming transport and logisticsDigitally transforming transport and logistics
Digitally transforming transport and logistics
 
Smart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital IndiaSmart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital India
 
Digging deep - the digital transformation of mining
Digging deep - the digital transformation of miningDigging deep - the digital transformation of mining
Digging deep - the digital transformation of mining
 
Retail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shoppingRetail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shopping
 
[White Paper] Are containers the future ?
[White Paper] Are containers the future ?[White Paper] Are containers the future ?
[White Paper] Are containers the future ?
 
[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

[EN] BYOD and Mobile Security Over a Coffee Preview

  • 2. BYOD and mobile security over a coffee Mobile phones and tablets have become both professional tools and status symbols. As more and more of us carry these must- have devices wherever we go, their security has emerged as a major challenge to both manufacturers and traditional security developers. So in a developing, diverse market that isn’t (yet) immune to unexpected disaster, what challenges does a Bring Your Own Device (BYOD) culture have in store for companies? What exactly is at risk when you lose your phone? And, lastly, what security devices can combine personal and professional use? These are some of the questions we will try to answer during this coffee break! We hope you enjoy reading this, and we’ll see you soon on our blogs! Philippe Macia editorial 2
  • 3. content in search of...lost smartphones don’t touch my BYOD! mobile security: wrapper or container? 3 BYOD and mobile security over a coffee
  • 4. 4 in search of... lost smartphones BYOD and mobile security over a coffee in search of... lost smartphones by Vincent Maurin What happens when a smartphone without a security system is left in the middle of an urban jungle? Experts from Symantec have tried to answer this question with the “Smartphone Honey Stick” project. the honey pot In cooperation with Perspective Inc., Symantec researchers had the (bad?) idea of “losing” 50 smartphones in the middle of five major North American cities: New York, Washington DC, Los Angeles, San Francisco and Ottawa. Abandoned in busy public spaces, the 50 smartphones contained applications that tracked their location and use. Since smartphones hold valuable personal and professional information, the Symantec researchers were interested to see how people who stumbled across the devices would behave. “lost” smartphones The 50 smartphones had no security system (password, etc). As stated in “The Symantec Smartphone Honey Stick Project”, the study aimed to analyze “human threats” to phones. It was designed to determine the probability that the finder of a device would: • unlock the phone (and the time it would take to do so) • access professional data and applications
  • 5. in search of... lost smartphones BYOD and mobile security over a coffee5 • access personal data and applications • access applications depending on type • return the smartphone to its owner • take the smartphone with him/her (and the time it would take to do so) The researchers assumed that the finder would access the phone’s data or applications for one of the following reasons: • identifying or locating the owner to return the device • reading content for curiosity’s sake • researching valuable information • using it personally (calls, Internet access) • resetting the phone for resale or reuse rigged applications and data Every smartphone had a set of improperly functioning applications with easy-to-understand names and icons. Source : Symantec Smartphone Honey Stick Project
  • 6. BYOD and mobile security over a coffee Our blog : http://www.orange-business.com/en/blogs/connecting-technology download the entire document at http://oran.ge/19EuaO0free 6