{"id":14727,"date":"2025-07-16T13:22:20","date_gmt":"2025-07-16T01:22:20","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=14727"},"modified":"2025-07-16T13:22:20","modified_gmt":"2025-07-16T01:22:20","slug":"webinar-replay-securing-the-mobile-frontier-cybersecurity-essentials-for-phones-and-tablets-for-modern-businesses","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=14727","title":{"rendered":"Webinar Replay &#8211; Securing the Mobile Frontier: Cybersecurity Essentials for Phones and Tablets for Modern Businesses"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<p>As mobile devices become the backbone of modern business operations, they also present a growing target for cyber threats.\u00a0<\/p>\n<p><strong>Apple or Android &#8211; they&#8217;re both important. \u00a0Every time you use these to access your Teams, Email or anything else, you are relying on them to be secure &#8211; and let&#8217;s be honest just how frequently that is!<\/strong><\/p>\n<p>In this 30-minute webinar recording, we explore the critical cybersecurity challenges businesses face in managing mobile devices\u2014from data breaches and phishing attacks to device loss and insecure networks.\u00a0<\/p>\n<p>&nbsp;<\/p>\n<h3>Learn practical strategies for securing mobile endpoints, implementing effective mobile device management (MDM), and ensuring compliance with evolving data protection regulations<\/h3>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_video src=&#8221;https:\/\/youtu.be\/bFJCqW8aMWU&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<div data-fui-tree-item-value=\"fuiTreeItemValue-r7ce\" role=\"treeitem\" data-key=\"0\" class=\"fui-TreeItem r15xhw3a ___1y6nu3o f10bgyvd f158kwzp\" aria-level=\"1\" tabindex=\"0\">\n<div class=\"fui-TreeItemLayout r1bx0xiv ___1b3q7dz fk6fouc fkhj508 figsok6 f1i3iumi f6jr5hl f1mk8lai f19n0e5 fprs0cq f1jyffnh fajluvm f8f3nui f1uvynv3 f5j5bv0 fu2e741 f8491dx\">\n<div class=\"fui-TreeItemLayout__main rklbe47\">\n<div class=\"fui-Flex ___86ra5p0 f22iagw fly5x3f f1869bpl f1okzopq fslhz8h\" data-testid=\"ai-notes-tree-item:0\"><span class=\"fui-Text ___c56hd20 fk6fouc fkhj508 f1i3iumi figsok6 fpgzoln f1w7gpdv f6juhto f1gl81tg f2jf649\"><b>Introduction and Webinar Overview:<span>\u00a0<\/span><\/b>Scott introduced the webinar, mentioning that Bill, the CTO, would be presenting on securing the mobile frontier. Scott also noted that the session would be recorded and available on their website.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-fui-tree-item-value=\"fuiTreeItemValue-r7cf\" role=\"treeitem\" data-key=\"1\" class=\"fui-TreeItem r15xhw3a ___1y6nu3o f10bgyvd f158kwzp\" aria-level=\"1\" aria-expanded=\"false\" tabindex=\"-1\">\n<div class=\"fui-TreeItemLayout r1bx0xiv ___1b3q7dz fk6fouc fkhj508 figsok6 f1i3iumi f6jr5hl f1mk8lai f19n0e5 fprs0cq f1jyffnh fajluvm f8f3nui f1uvynv3 f5j5bv0 fu2e741 f8491dx\">\n<div aria-hidden=\"true\" class=\"fui-TreeItemLayout__expandIcon rh4pu5o\"><\/div>\n<div class=\"fui-TreeItemLayout__main rklbe47\">\n<div class=\"fui-Flex ___86ra5p0 f22iagw fly5x3f f1869bpl f1okzopq fslhz8h\" data-testid=\"ai-notes-tree-item:1\"><span class=\"fui-Text ___c56hd20 fk6fouc fkhj508 f1i3iumi figsok6 fpgzoln f1w7gpdv f6juhto f1gl81tg f2jf649\"><b>Importance of Mobile Security:<span>\u00a0<\/span><\/b>Bill discussed the increasing importance of mobile security, highlighting the risks associated with lost or stolen devices, phishing, malicious applications, and credential theft. He emphasized the need to secure mobile devices due to the sensitive information they contain.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-fui-tree-item-value=\"fuiTreeItemValue-r7cg\" role=\"treeitem\" data-key=\"2\" class=\"fui-TreeItem r15xhw3a ___1y6nu3o f10bgyvd f158kwzp\" aria-level=\"1\" aria-expanded=\"false\" tabindex=\"-1\">\n<div class=\"fui-TreeItemLayout r1bx0xiv ___1b3q7dz fk6fouc fkhj508 figsok6 f1i3iumi f6jr5hl f1mk8lai f19n0e5 fprs0cq f1jyffnh fajluvm f8f3nui f1uvynv3 f5j5bv0 fu2e741 f8491dx\">\n<div aria-hidden=\"true\" class=\"fui-TreeItemLayout__expandIcon rh4pu5o\"><\/div>\n<div class=\"fui-TreeItemLayout__main rklbe47\">\n<div class=\"fui-Flex ___86ra5p0 f22iagw fly5x3f f1869bpl f1okzopq fslhz8h\" data-testid=\"ai-notes-tree-item:2\"><span class=\"fui-Text ___c56hd20 fk6fouc fkhj508 f1i3iumi figsok6 fpgzoln f1w7gpdv f6juhto f1gl81tg f2jf649\"><b>Risks and Threats:<span>\u00a0<\/span><\/b>Bill provided examples of risks and threats, including phishing, malicious applications, and credential theft. He mentioned a recent example of a banking Trojan hidden in a PDF reader app and the importance of being vigilant.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-fui-tree-item-value=\"fuiTreeItemValue-r7ch\" role=\"treeitem\" data-key=\"3\" class=\"fui-TreeItem r15xhw3a ___1y6nu3o f10bgyvd f158kwzp\" aria-level=\"1\" aria-expanded=\"false\" tabindex=\"-1\">\n<div class=\"fui-TreeItemLayout r1bx0xiv ___1b3q7dz fk6fouc fkhj508 figsok6 f1i3iumi f6jr5hl f1mk8lai f19n0e5 fprs0cq f1jyffnh fajluvm f8f3nui f1uvynv3 f5j5bv0 fu2e741 f8491dx\">\n<div aria-hidden=\"true\" class=\"fui-TreeItemLayout__expandIcon rh4pu5o\"><\/div>\n<div class=\"fui-TreeItemLayout__main rklbe47\">\n<div class=\"fui-Flex ___86ra5p0 f22iagw fly5x3f f1869bpl f1okzopq fslhz8h\" data-testid=\"ai-notes-tree-item:3\"><span class=\"fui-Text ___c56hd20 fk6fouc fkhj508 f1i3iumi figsok6 fpgzoln f1w7gpdv f6juhto f1gl81tg f2jf649\"><b>Intune Mobile Device Manager:<span>\u00a0<\/span><\/b>Bill explained the benefits of using Intune Mobile Device Manager, which is available with most Microsoft licenses. He highlighted its features, such as centralized inventory, basic security measures, remote lock and wipe, and integration with Azure ID for access control.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-fui-tree-item-value=\"fuiTreeItemValue-r7ci\" role=\"treeitem\" data-key=\"4\" class=\"fui-TreeItem r15xhw3a ___1y6nu3o f10bgyvd f158kwzp\" aria-level=\"1\" aria-expanded=\"false\" tabindex=\"-1\">\n<div class=\"fui-TreeItemLayout r1bx0xiv ___1b3q7dz fk6fouc fkhj508 figsok6 f1i3iumi f6jr5hl f1mk8lai f19n0e5 fprs0cq f1jyffnh fajluvm f8f3nui f1uvynv3 f5j5bv0 fu2e741 f8491dx\">\n<div aria-hidden=\"true\" class=\"fui-TreeItemLayout__expandIcon rh4pu5o\"><\/div>\n<div class=\"fui-TreeItemLayout__main rklbe47\">\n<div class=\"fui-Flex ___86ra5p0 f22iagw fly5x3f f1869bpl f1okzopq fslhz8h\" data-testid=\"ai-notes-tree-item:4\"><span class=\"fui-Text ___c56hd20 fk6fouc fkhj508 f1i3iumi figsok6 fpgzoln f1w7gpdv f6juhto f1gl81tg f2jf649\"><b>BYO vs. Corporate Devices:<span>\u00a0<\/span><\/b>Bill discussed the differences between managing BYO (Bring Your Own) devices and corporate devices. He emphasized the need for separate policies for each and the challenges associated with managing devices that are already in use.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-fui-tree-item-value=\"fuiTreeItemValue-r7cj\" role=\"treeitem\" data-key=\"5\" class=\"fui-TreeItem r15xhw3a ___1y6nu3o f10bgyvd f158kwzp\" aria-level=\"1\" aria-expanded=\"false\" tabindex=\"-1\">\n<div class=\"fui-TreeItemLayout r1bx0xiv ___1b3q7dz fk6fouc fkhj508 figsok6 f1i3iumi f6jr5hl f1mk8lai f19n0e5 fprs0cq f1jyffnh fajluvm f8f3nui f1uvynv3 f5j5bv0 fu2e741 f8491dx\">\n<div aria-hidden=\"true\" class=\"fui-TreeItemLayout__expandIcon rh4pu5o\"><\/div>\n<div class=\"fui-TreeItemLayout__main rklbe47\">\n<div class=\"fui-Flex ___86ra5p0 f22iagw fly5x3f f1869bpl f1okzopq fslhz8h\" data-testid=\"ai-notes-tree-item:5\"><span class=\"fui-Text ___c56hd20 fk6fouc fkhj508 f1i3iumi figsok6 fpgzoln f1w7gpdv f6juhto f1gl81tg f2jf649\"><b>Conditional Access and Compliance:<span>\u00a0<\/span><\/b>Bill shared a true story to illustrate the importance of knowing where company data is. He emphasized the need for conditional access, which ensures that devices must be compliant with Intune policies before accessing company data.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-fui-tree-item-value=\"fuiTreeItemValue-r7ck\" role=\"treeitem\" data-key=\"6\" class=\"fui-TreeItem r15xhw3a ___1y6nu3o f10bgyvd f158kwzp\" aria-level=\"1\" aria-expanded=\"false\" tabindex=\"-1\">\n<div class=\"fui-TreeItemLayout r1bx0xiv ___1b3q7dz fk6fouc fkhj508 figsok6 f1i3iumi f6jr5hl f1mk8lai f19n0e5 fprs0cq f1jyffnh fajluvm f8f3nui f1uvynv3 f5j5bv0 fu2e741 f8491dx\">\n<div aria-hidden=\"true\" class=\"fui-TreeItemLayout__expandIcon rh4pu5o\"><\/div>\n<div class=\"fui-TreeItemLayout__main rklbe47\">\n<div class=\"fui-Flex ___86ra5p0 f22iagw fly5x3f f1869bpl f1okzopq fslhz8h\" data-testid=\"ai-notes-tree-item:6\"><span class=\"fui-Text ___c56hd20 fk6fouc fkhj508 f1i3iumi figsok6 fpgzoln f1w7gpdv f6juhto f1gl81tg f2jf649\"><b>Implementing Intune Policies:<span>\u00a0<\/span><\/b>Bill provided a step-by-step approach to implementing Intune policies, starting with simple policies for BYO and company devices. He recommended enforcing basic security measures, managing device enrollment, and gradually introducing more advanced policies.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-fui-tree-item-value=\"fuiTreeItemValue-r7cl\" role=\"treeitem\" data-key=\"7\" class=\"fui-TreeItem r15xhw3a ___1y6nu3o f10bgyvd f158kwzp\" aria-level=\"1\" aria-expanded=\"false\" tabindex=\"-1\">\n<div class=\"fui-TreeItemLayout r1bx0xiv ___1b3q7dz fk6fouc fkhj508 figsok6 f1i3iumi f6jr5hl f1mk8lai f19n0e5 fprs0cq f1jyffnh fajluvm f8f3nui f1uvynv3 f5j5bv0 fu2e741 f8491dx\">\n<div aria-hidden=\"true\" class=\"fui-TreeItemLayout__expandIcon rh4pu5o\"><\/div>\n<div class=\"fui-TreeItemLayout__main rklbe47\">\n<div class=\"fui-Flex ___86ra5p0 f22iagw fly5x3f f1869bpl f1okzopq fslhz8h\" data-testid=\"ai-notes-tree-item:7\"><span class=\"fui-Text ___c56hd20 fk6fouc fkhj508 f1i3iumi figsok6 fpgzoln f1w7gpdv f6juhto f1gl81tg f2jf649\"><b>Addressing Staff Concerns:<span>\u00a0<\/span><\/b>Scott and Bill discussed potential staff concerns about mobile device management, particularly with BYO devices. They emphasized the importance of clear communication and providing documentation to explain what the management entails and how it protects company data.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-fui-tree-item-value=\"fuiTreeItemValue-r7cm\" role=\"treeitem\" data-key=\"8\" class=\"fui-TreeItem r15xhw3a ___1y6nu3o f10bgyvd f158kwzp\" aria-level=\"1\" tabindex=\"-1\">\n<div class=\"fui-TreeItemLayout r1bx0xiv ___1b3q7dz fk6fouc fkhj508 figsok6 f1i3iumi f6jr5hl f1mk8lai f19n0e5 fprs0cq f1jyffnh fajluvm f8f3nui f1uvynv3 f5j5bv0 fu2e741 f8491dx\">\n<div aria-hidden=\"true\" class=\"fui-TreeItemLayout__expandIcon rh4pu5o\">\n<div class=\"fui-Flex ___1qsiyym f22iagw f1tbgdz5 f1mk8lai\"><\/div>\n<\/div>\n<div class=\"fui-TreeItemLayout__main rklbe47\">\n<div class=\"fui-Flex ___86ra5p0 f22iagw fly5x3f f1869bpl f1okzopq fslhz8h\" data-testid=\"ai-notes-tree-item:8\"><span class=\"fui-Text ___c56hd20 fk6fouc fkhj508 f1i3iumi figsok6 fpgzoln f1w7gpdv f6juhto f1gl81tg f2jf649\"><b>Best Practices for Phone Access Control:<span>\u00a0<\/span><\/b>Bill addressed a question about the best phone access control methods, recommending a PIN with at least six characters, including letters and numbers. He noted that facial recognition and fingerprint methods can also be used, depending on user preference.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-fui-tree-item-value=\"fuiTreeItemValue-r7cn\" role=\"treeitem\" data-key=\"9\" class=\"fui-TreeItem r15xhw3a ___1y6nu3o f10bgyvd f158kwzp\" aria-level=\"1\" tabindex=\"-1\">\n<div class=\"fui-TreeItemLayout r1bx0xiv ___1b3q7dz fk6fouc fkhj508 figsok6 f1i3iumi f6jr5hl f1mk8lai f19n0e5 fprs0cq f1jyffnh fajluvm f8f3nui f1uvynv3 f5j5bv0 fu2e741 f8491dx\">\n<div aria-hidden=\"true\" class=\"fui-TreeItemLayout__expandIcon rh4pu5o\">\n<div class=\"fui-Flex ___1qsiyym f22iagw f1tbgdz5 f1mk8lai\"><\/div>\n<\/div>\n<div class=\"fui-TreeItemLayout__main rklbe47\">\n<div class=\"fui-Flex ___86ra5p0 f22iagw fly5x3f f1869bpl f1okzopq fslhz8h\" data-testid=\"ai-notes-tree-item:9\"><span class=\"fui-Text ___c56hd20 fk6fouc fkhj508 f1i3iumi figsok6 fpgzoln f1w7gpdv f6juhto f1gl81tg f2jf649\"><b>Next Webinar Announcement:<span>\u00a0<\/span><\/b>Bill announced the next webinar, which will feature a guest speaker from NAble discussing current cybersecurity trends and best practices. The focus will be on understanding the basics of cybersecurity and what organizations need to do to stay secure.<\/span><\/div>\n<div class=\"fui-Flex ___86ra5p0 f22iagw fly5x3f f1869bpl f1okzopq fslhz8h\" data-testid=\"ai-notes-tree-item:9\"><span class=\"fui-Text ___c56hd20 fk6fouc fkhj508 f1i3iumi figsok6 fpgzoln f1w7gpdv f6juhto f1gl81tg f2jf649\">Register at <a href=\"https:\/\/new.kinetics.co.nz\/events\">new.kinetics.co.nz\/events<\/a><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text disabled_on=&#8221;on|on|on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; disabled=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<p><span>The webinar, led by Matt Patterson, CEO of Kinetics, and guest Duncan Morrison from Aon, focused on the critical topic of cyber insurance, exploring whether businesses are truly insured against cyberattacks. They discussed the importance of having the right protections in place to qualify for cyber insurance and the evolving landscape of cyber threats and insurance expectations. Key points included the necessity of regular hardware and software updates, strong passwords, multi-factor authentication, and employee training to mitigate risks. Duncan emphasized the insurers&#8217; perspective on assessing risk, highlighting the significance of access controls, incident response plans, and the culture of cybersecurity within organizations. The session concluded with insights into how cyber insurers assess risk and the consequences of inadequate protection, stressing the importance of aligning with insurers&#8217; expectations to ensure comprehensive coverage.<\/span>.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>As mobile devices become the backbone of modern business operations, they also present a growing target for cyber threats.\u00a0 Apple or Android &#8211; they&#8217;re both important. \u00a0Every time you use these to access your Teams, Email or anything else, you are relying on them to be secure &#8211; and let&#8217;s be honest just how frequently [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":14728,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5,11],"tags":[],"class_list":["post-14727","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security","category-webinar-recording"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/14727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14727"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/14727\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}