Bluetooth encryption
At least AES
Mobile device firewall needs…
Root or admin privileges
Mobile VPN to central server
Central server can perform firewall functions
Much safer than a mobile firewall
Touch ID fail rate
1 in 50,000
Face ID fail rate
1 in 1,000,000
Mobile device 4 deployment options
COBO Corporate owned business only
COPE corp owned personally enabled
CYOD choose your own device
BYOD bring your own device
Mobile storage segmentation
Creates a separation between personal and work data on a device
4 Common IOT vulnerabilities
Insecure defaults
Hard-coded configurations
Clear text communication
Data leakage
IOT data vulnerability
Data modification
Data exfiltration