t.a.s.c - mobile device secuirty

8
Watch the slide show

Upload: adam-radly

Post on 13-Apr-2017

188 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: T.A.S.C - mobile device secuirty

Watch the slide show

Page 2: T.A.S.C - mobile device secuirty

The Cybersecurity Opportunity

Page 3: T.A.S.C - mobile device secuirty

Q: What does T.A.S.C mean?A: The Art & Science of Cybersecurity

Q: What is TASC?A: A cybersecurity dashboard that allows users to activate numerous security apps that protect mobile devices

Q: What specific security solutions does TASC provide?A: Anti theft. If a device is stolen, device owners can track it, control it, wipe data from it. Whys is this important? BYOD – see the next slide

TASC also provides an app for secure communication that encrypts voice and SMS communication. Other apps are in the pipeline.

Page 4: T.A.S.C - mobile device secuirty

Q: Why is mobile security important?

A: BYOD (Bring Your Own Device)

84% use the same smartphone for work and for personal usage.

81% of employed adults use at least one personally owned electronic device for business

59% use their mobile devices to run line-of-business applications

74% of companies allow BYOD usage in some manner

1/3 use mobile devices exclusively

Source: Experian Mobile Security Survey, November 2013 (Harris Interactive)

Page 5: T.A.S.C - mobile device secuirty

Q: What are CISO’s concerned with?A: Mobile devices such as smart phones and tablets.

Source: EC-Council

Page 6: T.A.S.C - mobile device secuirty

Mobile security from a user perspective

50% of companies have experienced a data breach due to inadequate device security

47% don’t have a password on their mobile phone.

51% stated their companies couldn’t execute a remote wipe if lost or stolen.

49% said mobile security has not been addressed with them by IT.

Source: EC-Council

Page 7: T.A.S.C - mobile device secuirty

Mobile Malware Trends

98% of all mobile malware targets Android users

Kaspersky: 3.4M malware detections on 1.1M devices

60% of all attacks are capable of stealing users’ money

Reported attacks have increased 6X! (from 35K in August 2013 to 242K as of March 2014 Real-time Endpoint Threat Detection and Response 14

Source: EC-Council

Page 8: T.A.S.C - mobile device secuirty

Summary

TASC allows enterprise customers (and or individuals) to control mobile devices in order to minimize security threats from stolen or virus inflected devices.

TASC focuses initially on Android due to high rate of security breaches.

TASC provides a suite of solutions that work together so users don’t have to hope that apps work together.

Apps for antivirus, permanent data destruction and others are in the pipeline.