Professional Documents
Culture Documents
uk
...What You Need To Know To Ensure Your Computers & Mobile Devices Remain Secure Online!
Disclaimer:
ESET UK has endeavoured to ensure all material within this book is accurate and correct at the time of publication. ESET UK acknowledges that the materials accuracy and relevance may change at some stage in the future and therefore strongly advises the reader to use this material as a guide only and to cross-reference other material as a means of assessing its accuracy. ESET UK is not responsible for the content of any external websites referenced in this material. ESET UK reserves the right to amend, remove or otherwise change any and all products and website materials present on the http://www.eset.co.uk/website that this material references.
www.eset.co.uk
Chapter 1
Mac vs PC - Debunking The MythThe Real Truth Laid Bare
In 2007 comedy duo David Mitchell and Robert Webb were employed by Apple to advertise1 their Mac computer... Last year there were 114,000 known viruses for PCs, said Mitchell, playing a sneezing PC. PCs, not Macs, replied the Mac, otherwise known as Webb. The advert does not outright claim that Macs arent affected by viruses, but it does suggest that viruses arent something Mac users need to worry about. Is it still true in 2013 that Macs arent affected by viruses, or could the idea that Mac users do not need antivirus software lead to big problems for the millions of Mac users worldwide?
www.eset.co.uk
However, as more people are beginning to use Macs, the security threat is becoming more real - especially when you consider that the Mac market share in wealthy western countries is as much as 20%. Inevitably, more and more criminals will be tempted to make viruses targeting Macs specifically.
www.eset.co.uk References:
1 - http://www.youtube.com/watch?v=iY1iSocnPw0 2 - http://www.pcadvisor.co.uk/features/security/3418367/do-apple-macsneed-antivirus-os-x-security-explained/ 3 - http://www.examiner.com/article/not-invulnerable-flashback-trojan-said-tohijack-600-000-macs 4 - http://www.examiner.com/article/apple-quietly-admits-os-x-no-longer-virusfree
www.eset.co.uk
Chapter 2
Android Operating System On Your Mobile Device Essential Security Information You Need To Know!
One of the most innovative, customisation-friendly and democratic platforms available, Android, is in many respects an app-lovers dream. With an open platform that allows for adaptation and the sale of an enormous range of exciting apps at lightning speed, the Android world moves quickly. There is, however, a downside This free love approach can leave Android users vulnerable1 to hackers and malicious software, particularly if their Operating System (OS) is in any way out of date. Indeed, dubbed by some experts2 the natural choice for online attacks, Androids brave new open world requires stringent security measures in order to keep users data safe. In this article, we examine 3 Android OS-related security problems and what can be done about them.
3. Androids Open Platform Enables Device Manufacturers And Carriers To Adjust The Operating System
And they often do; for example, for the purposes of setting desired configuration settings or offering extra software bundles. Whenever a new Android operating system update is released, the carriers and the vendor need to test these adjustments against their own home-brew systems before they can release the latest version4. Some devices never get the latest version because they are older models or are being phased out. Google releases an update roughly every 6 months, but some devices have been known not to receive a single update for well over a year, if at all4. With all these potential issues, its perhaps little wonder than some IT experts have dubbed Android the IT communitys latest problem child5. In fact recent research by French security experts Pradeo6 showed Android app threats to outnumber those by IOS apps by a rate of 21:1. At the same time, its well acknowledged7 that Android offers users fantastic customisation options and an enormous range of
www.eset.co.uk
fantastic apps that make life just that little bit easier and more enjoyable. To help make your Android and mobile device more secure, there are a number of leading mobile antivirus solutions worth investigating, that are fairly priced and easy to use.
References:
1 - http://www.cio.com/article/675084/8_Essential_Android_Security_Apps 2 - http://www.itworld.com/open-source/350033/android-it-communitys-latestproblem-child 3 - http://developer.android.com/about/dashboards/index.html 4 - http://securitywatch.pcmag.com/android/308966-android-s-biggestsecurity-threat-os-fragmentation 5 - http://www.itworld.com/open-source/350033/android-it-communitys-latestproblem-child 6 - http://www.gomonews.com/android-apps-are-more-risky-than-ios-by-211says-pradeo/ 7 - http://techland.time.com/2013/04/25/new-android-phone-check-out-these14-essential-hints-and-tips/
www.eset.co.uk
Chapter 3
Bring Your Own Device (BYOD) & Security6 Simple Steps To Help Ensure Your BYOD Safety
Over the past few years, the functions and range of use of mobile technology has exploded with smartphones and tablets. At the same time, flexible working patterns, Social Media marketing and remote working has continued to blur the line between work and home somewhat. As such, the practice of BYOD (Bring Your Own Device) into work has flourished.
www.eset.co.uk
Indeed, one study1 found that in situations where devices were intentionally lost and data was compromised leading to financial losses, the average cost to a company was $250,000. So how can you ensure security for BYOD? It begins with a few clear steps:
3. Conduct Full-Disk Encryption For Disk, Cloud Storage And Removable Media
If the device-point passcode is somehow compromised, ensuring that the data stored on the device is encrypted offers a second layer of security that a hacker would need to breach in order to be able to steal the data.
5. Application Control
Ask yourself if you have the authority to ban the use of certain applications on BYOD? For example, IBM recently banned2 some speech-to-text applications on employee devices. Should you and would you be able to do the same?
6. Purchase Antivirus And Firewall Protection As Well As Data Loss Prevention (DLP) Software For Use Across All Devices
The best antivirus and firewall software products for use across BYOD can protect you from hacking attempts. But what is Data Loss Prevention (DLP) software and how can it protect you from potential data leaks within your own ranks? Data Loss Prevention software is there to ensure that end users cannot transfer critical or sensitive data beyond your business network. It can help your administrators monitor and control what information your employees send - this is essential. Allowing your employees to access company data through their own devices presents particular risks and unfortunately, not all antivirus and data loss prevention software products can offer the same level of protection from threats.
www.eset.co.uk References:
1 - http://smallbiztrends.com/2013/06/byod-trend-productivity-security.html 2 - http://www.sophos.com/en-us/security-news-trends/security-trends/byodrisks-rewards/what-byod-means-for-security.aspx
www.eset.co.uk
Chapter 4
SME/SMB PC & Mobile Device Best Practices5 Essential Tips Your Business Will Immediately Benefit From
Streamlining your means of communication and data management is crucial, whatever the size of your business. Over the last 10 years or so, one of the most notable shifts in the business world has been the increasing demand for the easy access of corporate applications and data on mobile devices. Individual productivity and collaboration tools like email, contact management, calendars and general web access have spearheaded the trend in companies going mobile. Now businesses increasingly want to make as many processes as possible personal PC-based and mobile, in order to facilitate productivity and flexibility for customers. Research shows this is true not just for larger businesses - in fact a 2010 study1 showed that 84% of medium-sized enterprises (from 100 to 1000 employees) use wireless and mobile devices for essential business functions. Most small and medium-sized businesses dont have a large IT support team to manage their PC and mobile systems and therefore, they will often look for effective, ready-to-use systems. However, the effective selection and management of any systems can still be tricky and requires a number of considerations. Here are 5, essential tips for SME/SMB PC and mobile device use:
www.eset.co.uk
In fact, as business IT experts1 advise, the adoption of any new systems should be preceded by a clear weighing of the costs and benefits, as well as the specific end-goals. A key question when considering new systems and applications should be: how will they streamline workflows, bring down costs or enhance our customer service?
www.eset.co.uk
companies are now unknowingly using encryption technology incorrectly. Many leading experts now advise whole-disk encryption as opposed to encryption at file-level especially for employees who manage customer data on mobile devices or PCs. Data encryption standards can change at a rapid rate and businesses that encrypt data according to standards of a few years ago, may be easily breached today.
References:
1. http://www.smb-gr.com/wpcontent/uploads/2012/pdfs/SAP_Business_All_in_One_paper3.pdf
www.eset.co.uk
Additional Resources
Please click on the links below for more helpful tools and information; Free online scanner Glossary of computer threat terms ESET Threat Centre