Go offline with the Player FM app!
Physical threats to mobile phones, SIM hijacking, out of band SMS, and Yubikeys
Manage episode 381384861 series 2981977
- Tom has decades in capital goods manufacturing industry (fortune 500 scale)
- Years of experience in marketing, sales & interfacing with independent dealers/distributors (small/medium scale)
- Current focus is strategy & risk management consulting
- Lifelong learner and an interest in technology.
- Strategy + risk management ---> mobile devices
Laptops have transformed to mobile devices (phones and tablets)
Risk was more contained with laptops, but the impact is much higher with mobile phones. A lot of nuances around "was the password revealed?"
Biometrics are convenient but quite dangerousBiometrics are a proxy for a numeric passcode on a mobile device.
Physical compromise is a 5-alarm fire situation.
Physical loss when it is not compromised is not that big of an issue as long as authenticators are backed up.
Must have erase after 10 bad password attempts. Turn off notifications on screen lock. Do not have notifications turned on to display on the lock screen.
Avoid banking apps.
The first things that the baddies go after are Venmo, Apple Pay, Cash apps.
Out of band SMS for MFASIM swapping risk, or eSIM embedded in the phone
Put a PIN on your physical SIM.
MySudo – Can clone that instance to other phones.
Password manager on phoneDisaster if this is based upon your biometric. You can use a different or secondary PIN. You can use Yubikey.
Password manager helps you recover.
Segmentation strategiesThey can see all the emails on your phone and change passwords or password reset is typically done via email
Screentime on Apple can be helpful, but there are weaknesses there. The only way to really secure the device is to use a MDM. You still need to be concerned about MFA and account takeovers.
Need to have an out of band mechanism to receive alerts and ability to remove kill the device.
Microsoft Authenticator and Google Authenticator do not have a separate PIN.
Authy is free. It has its own separate PIN.
Yubikey is great but assumes that you can manage controlling the physical access to that. Do not store on your key chain.
Diversification strategy with inventory.
MDM- Kill apps
- Apple configurator – small scale
- Apple Business Manager
- Jamf – requires Apple Business account for security
- Inexpensive “Jamf Now” for small businesses. Minimum is one device. The first 3 are free. Still affordable beyond that.
- Don’t let anyone change the account on this device.
- You have to figure out a lot on your own and block URLs that you don’t want accessed.
- Apple devices need to be in supervised mode, so it matters how you buy them.
- Intune
- loss of device (resiliency e.g. MFA)
- theft of device involving passcode surrender (loss mitigation)
- SIM swap (cellular store employees)
- SIM card theft (removal of SIM card from phone)
- OS decision (iOS vs. android)
- Note that one is not better than the other
- Risk reduction is all about an individual's ability to manage the risks based upon platform selection
- MDM (remote data wipe): small-scale co (Apple Configurator or JamfNow) vs. corporate MDM
- MFA backup/diversification (SMS via cell or VOIP providers vs. TOTP vs. passkey/yubikey etc.)
- App selection (OS-based or Independent)
- App protection (‘independent’ PIN protection vs. face/touch ID)
- ‘Attack Surface’ – minimization of exposure (e.g. banking apps, cash apps, findmyfriends etc.)
96 episodes
Manage episode 381384861 series 2981977
- Tom has decades in capital goods manufacturing industry (fortune 500 scale)
- Years of experience in marketing, sales & interfacing with independent dealers/distributors (small/medium scale)
- Current focus is strategy & risk management consulting
- Lifelong learner and an interest in technology.
- Strategy + risk management ---> mobile devices
Laptops have transformed to mobile devices (phones and tablets)
Risk was more contained with laptops, but the impact is much higher with mobile phones. A lot of nuances around "was the password revealed?"
Biometrics are convenient but quite dangerousBiometrics are a proxy for a numeric passcode on a mobile device.
Physical compromise is a 5-alarm fire situation.
Physical loss when it is not compromised is not that big of an issue as long as authenticators are backed up.
Must have erase after 10 bad password attempts. Turn off notifications on screen lock. Do not have notifications turned on to display on the lock screen.
Avoid banking apps.
The first things that the baddies go after are Venmo, Apple Pay, Cash apps.
Out of band SMS for MFASIM swapping risk, or eSIM embedded in the phone
Put a PIN on your physical SIM.
MySudo – Can clone that instance to other phones.
Password manager on phoneDisaster if this is based upon your biometric. You can use a different or secondary PIN. You can use Yubikey.
Password manager helps you recover.
Segmentation strategiesThey can see all the emails on your phone and change passwords or password reset is typically done via email
Screentime on Apple can be helpful, but there are weaknesses there. The only way to really secure the device is to use a MDM. You still need to be concerned about MFA and account takeovers.
Need to have an out of band mechanism to receive alerts and ability to remove kill the device.
Microsoft Authenticator and Google Authenticator do not have a separate PIN.
Authy is free. It has its own separate PIN.
Yubikey is great but assumes that you can manage controlling the physical access to that. Do not store on your key chain.
Diversification strategy with inventory.
MDM- Kill apps
- Apple configurator – small scale
- Apple Business Manager
- Jamf – requires Apple Business account for security
- Inexpensive “Jamf Now” for small businesses. Minimum is one device. The first 3 are free. Still affordable beyond that.
- Don’t let anyone change the account on this device.
- You have to figure out a lot on your own and block URLs that you don’t want accessed.
- Apple devices need to be in supervised mode, so it matters how you buy them.
- Intune
- loss of device (resiliency e.g. MFA)
- theft of device involving passcode surrender (loss mitigation)
- SIM swap (cellular store employees)
- SIM card theft (removal of SIM card from phone)
- OS decision (iOS vs. android)
- Note that one is not better than the other
- Risk reduction is all about an individual's ability to manage the risks based upon platform selection
- MDM (remote data wipe): small-scale co (Apple Configurator or JamfNow) vs. corporate MDM
- MFA backup/diversification (SMS via cell or VOIP providers vs. TOTP vs. passkey/yubikey etc.)
- App selection (OS-based or Independent)
- App protection (‘independent’ PIN protection vs. face/touch ID)
- ‘Attack Surface’ – minimization of exposure (e.g. banking apps, cash apps, findmyfriends etc.)
96 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.