According to a post by CSIS Security Group A/S, they have uncovered a new trojan-banker family which they have named Tinba (Tiny Banker) alias “Zusy”. Tinba is a small data stealing trojan-banker. It hooks into browsers and steals login data and sniffs on network traffic. As several sophisticated banker-trojan it also uses Man in The Browser (MiTB) tricks and webinjects in order to change the look and feel of certain webpages with the purpose of circumventing Two factor Authentification (2FA) or tricking the infected user to give away additional sensitive data such as credit card data or TANs.
This document establishes all the technical security standards that must be met to properly enforce the modified Acceptable Use Policy and high-level IT governance policy as well as, of course, the Portable Devices Security Procedure.
Portable Devices Audit Checklist: This three-part checklist assists your technical team (or whomever is identified in your policy statement) in auditing both BYOD (authorized) devices and company-owned devices. It includes an asset inventory as well as a checklist for smartphones, tablet pc’s, and laptops. It makes an excellent mobile devices audit checklist! All templates are color-coded, […]
Satisfaction Guaranteed or we will refund your money!
All templates are color coded to make it easier for you to customize them to your organization.
This “drill-down risk assessment” will help you determine risks and controls related to mobile device security and BYOD!
A boilerplate “Agenda for Configuration Standards Meeting” that is a part of our Mobile Devices Security Kit.
When you pay for our IT policies and procedures templates, you are agreeing to these terms and conditions of the sale.
The mobile devices policy, called a “Portable Devices Security Procedure” because it does not pertain to ALL users, governs how users are to use, secure, maintain, and retire a portable device (either company-owned or BYOD).