As mobile devices become the backbone of modern business operations, they also present a growing target for cyber threats.
Apple or Android – they’re both important. Every time you use these to access your Teams, Email or anything else, you are relying on them to be secure – and let’s be honest just how frequently that is!
In this 30-minute webinar recording, we explore the critical cybersecurity challenges businesses face in managing mobile devices—from data breaches and phishing attacks to device loss and insecure networks.
Learn practical strategies for securing mobile endpoints, implementing effective mobile device management (MDM), and ensuring compliance with evolving data protection regulations
Introduction and Webinar Overview: Scott introduced the webinar, mentioning that Bill, the CTO, would be presenting on securing the mobile frontier. Scott also noted that the session would be recorded and available on their website.
Importance of Mobile Security: Bill discussed the increasing importance of mobile security, highlighting the risks associated with lost or stolen devices, phishing, malicious applications, and credential theft. He emphasized the need to secure mobile devices due to the sensitive information they contain.
Risks and Threats: Bill provided examples of risks and threats, including phishing, malicious applications, and credential theft. He mentioned a recent example of a banking Trojan hidden in a PDF reader app and the importance of being vigilant.
Intune Mobile Device Manager: Bill explained the benefits of using Intune Mobile Device Manager, which is available with most Microsoft licenses. He highlighted its features, such as centralized inventory, basic security measures, remote lock and wipe, and integration with Azure ID for access control.
BYO vs. Corporate Devices: Bill discussed the differences between managing BYO (Bring Your Own) devices and corporate devices. He emphasized the need for separate policies for each and the challenges associated with managing devices that are already in use.
Conditional Access and Compliance: Bill shared a true story to illustrate the importance of knowing where company data is. He emphasized the need for conditional access, which ensures that devices must be compliant with Intune policies before accessing company data.
Implementing Intune Policies: Bill provided a step-by-step approach to implementing Intune policies, starting with simple policies for BYO and company devices. He recommended enforcing basic security measures, managing device enrollment, and gradually introducing more advanced policies.
Addressing Staff Concerns: Scott and Bill discussed potential staff concerns about mobile device management, particularly with BYO devices. They emphasized the importance of clear communication and providing documentation to explain what the management entails and how it protects company data.
Best Practices for Phone Access Control: Bill addressed a question about the best phone access control methods, recommending a PIN with at least six characters, including letters and numbers. He noted that facial recognition and fingerprint methods can also be used, depending on user preference.
Next Webinar Announcement: Bill announced the next webinar, which will feature a guest speaker from NAble discussing current cybersecurity trends and best practices. The focus will be on understanding the basics of cybersecurity and what organizations need to do to stay secure.
Register at Kinetics.co.nz/events