Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Chapter 3: Mobile Computing
Presenter:Rick Oelerich
Tech 3.0
37
2
Mobile Computing What is the Buzz About?
Apple Computer has changed our expectations of mobile computing forever
37
Chapter 3: Mobile Computing
Images courtesy of bing.com
3
Mobile Computing What is the Buzz About?
Consumers are about music, pictures and social site postings
37
Chapter 3: Mobile Computing
4
Mobile Computing What is the Buzz About?
Businesses are using these consumer devices to find ways to be more efficient and stay in touch
37
Chapter 3: Mobile Computing
5
Mobile Computing What is the Buzz About?
The use of hand held devices is a reflection of our society that expects and immediate answer to almost everything
Accounting firms are now adopting these devices as a means of staying in touch with clients and furnishing information upon request
37
Chapter 3: Mobile Computing
6
Mobile Computing What is the Buzz About?
Increasingly we will use our handheld devices to stay in touch with our clients 24/7.
37
Chapter 3: Mobile Computing
Image courtesy of engadget.com
Our mobile devices will not replace our desktops and laptops but will be an extension of them as they are consumers not producers of information
Images courtesy of bing.com
7
Mobile Operating SystemsAs accountants we should be primarily concerned about security. Most mobile devices have will need “tweaking” out of the box to deal with concerns we should have.
If we make our purchase decision solely on the security of the platform out of the box to a large degree it will not reflect the current market place.
37
Chapter 3: Mobile Computing
8
Mobile Operating SystemsThe leading mobile device platforms currently are as follows:
1. Blackberry
2. Symbian
3. Apple iOS4
4. Windows Mobile 7
5. Droid
38
Chapter 3: Mobile Computing
9
Mobile Operating SystemsAt this point in time mobile operating systems are somewhat akin to XP – Inherently not secure and will need our attention to adequately protect our data
37
Chapter 3: Mobile Computing
10
Mobile Operating SystemsThe leading five mobile operating systems are listed in what most experts perceive to be their security profile based on:
The security architecture of the platform.
The ability of the device to be secured, controlled and managed.
The vulnerability profile and threat landscape
38
Chapter 3: Mobile Computing
11
Mobile Operating SystemsBlackberry – Most secure mobile device platform. Built with the need for security in mind. The security threat is moderate BUT the app environment continues to be weak.
38
Chapter 3: Mobile Computing
Image courtesy of recombu.com
12
Symbian – A fading platform but a very secure device for Exchange and Active Sync integration – i.e. a platform designed for business applications but not enough demand in market place.
38
Chapter 3: Mobile Computing
Image courtesy of recombu.com
Mobile Operating Systems
13
Mobile Operating SystemsApple iOS5 – The iPhone has become the system that all want to become. A consumer device that has adopted to the business market. Its biggest threat is its market domination. Jailbreaking the device creates issues.
38
Chapter 3: Mobile Computing
Image courtesy of recombu.com
14
Windows Mobile 7 (about to become 8) –Another MS device that fails to address security in general and almost completely devoid of enterprise based tools
42
Chapter 3: Mobile Computing
Image courtesy of recombu.com
Mobile Operating Systems
15
Mobile Operating SystemsAndroid – Out of the box a security disaster – A limited amount of attention being given by Google to toughen up its security posture. Will require available security apps to make viable for business use.
39
Chapter 3: Mobile Computing
Image courtesy of recombu.com
16
Mobile Operating SystemsFor the Apple, Windows Mobile 7 and Droid OS phones steps must be taken to secure these platforms – your carrier does not care
AT&T
T-Mobile
Sprint
Verizon
?
39
Chapter 3: Mobile Computing
17
Mobile Operating SystemsA user of the iPhone or iPad that fails to consider security is making a serious mistake.
39
Chapter 3: Mobile Computing
http://www.macworld.com/article/1135957/iphone_security.html
18
Mobile Operating SystemsApple iPhone and iPad security best practices can be found at the Apple Store.
One of the best ways to keep up with all that is critical in the world of Mobile OS security is at www.pcmag.com
39
Chapter 3: Mobile Computing
19
Mobile Operating Systems1. Auto-Lock – Locks touch screen after
predetermined period
2. Passcode Lock – Requires a password to access device.
3. Wi-Fi – Turn on “Ask to Join Networks”
4. Use a secured server to obtain e-mail and avoid browser based delivery systems.
40
Chapter 3: Mobile Computing
20
Mobile Operating Systems5. Set the browser settings especially by
turning off pop-ups and checking the cookie settings.
6. Set up device usage restrictions which can block sites of the devices choosing
40
Chapter 3: Mobile Computing
21
Mobile Operating SystemsWindows Mobile 7 – Install security software such as:
40-41
Chapter 3: Mobile Computing
Image courtesy of http://m.bitdefender.com/site/view/mobile-security.html
Image courtesy ofhttp://www.symantec.com/mobile-security-suite-for-windows-mobile
22
Mobile Operating SystemsAndroid Operating System – NEVER fail to address the installation of a security app on your android OS
41
Chapter 3: Mobile Computinghttps://www.mylookout.com/
23
Mobile Operating Systems
41
Chapter 3: Mobile Computing
Android Operating System – NEVER fail to address the installation of a security app on your android OS
https://www.wavesecure.com/products/android.aspx
24
Mobile DevicesWhat has lead to this explosion of handheld devices?
The increase in speed of data transfer over the wireless (cell) system.
Increasing amounts of data can be handled by the system
42
Chapter 3: Mobile Computing
25
Mobile DevicesWhile choice of a carrier will always be a financial decision pay attention to:
42
Chapter 3: Mobile Computing
26
Mobile DevicesThe survivors/victors of the mobile war:
42
Chapter 3: Mobile Computing
Image courtesy of http://en.wikipedia.org/wiki/File:Galaxy_Nexus_smartphone.jpg
27
Mobile DevicesThe survivors/victors of the mobile war:
43
Chapter 3: Mobile Computing
Image courtesy of http://en.wikipedia.org/wiki/File:IFA_2010_Internationale_Funkausstellung_Berlin_03.JPG
28
Mobile DevicesThe survivors/victors of the mobile war:
The Ultra-Mobile PC (UMPC) or Netbook
43
Chapter 3: Mobile Computing
Image Courtesy http://en.wikipedia.org/wiki/File:UMPC_Samsung-Q1-Ultra.JPG
29
Mobile DevicesThe survivors/victors of the mobile war:
43
Chapter 3: Mobile Computing
A review of the UMPC will demonstrate high power machines MSRP - $999
Image courtesy of http://www.shopping.hp.com/en_US/home-office/-/products/Laptops/HP-Folio/B2A32UT?HP-Folio-13-Notebook-PC-ENERGY-STAR-
30
Mobile DevicesToday’s UMPC or Netbook can be found with:
Intel Chipsets
SSD (Solid State Drives)
Windows 7 Professional 64 bit version
Flash memory for fast startup
Long Battery Life
44
Chapter 3: Mobile Computing
31
Mobile DevicesFor the accountant who must have the most up to date technology:
The Wearable Computer
44
Chapter 3: Mobile Computing
Image courtesy of http://en.wikipedia.org/wiki/Wearable_computer
32
What Does all of this Mean for the Accounting Firm of Today?
Somebody, someday will use these devices to access confidential firm information.
1. Pricewaterhouse Coopers – Has identified that 28% of it’s staff were using devices that were outside the control of the firm.
Problem – How to insure and verify the security of client data
44
Chapter 3: Mobile Computing
33
What Does all of this Mean for the Accounting Firm of Today?
2. Consumer based devices do not have enough capacity to deal with files so data is off-loaded to even less secure devices.
3. Multiple data use – In the AM reviewing a confidential client file and in the evening visiting Facebook or visiting a questionable web site.
46
Chapter 3: Mobile Computing
34
What Does all of this Mean for the Accounting Firm of Today?
Other studies have discovered:
1. Cyber attacks against high profile businesses are on the rise.
2. Privacy issues when personal devices are used on a regular basis for communicating with clients.
3. The multitude of varied devices and their proliferation is now the top technology concern
45
Chapter 3: Mobile Computing
35
What Does all of this Mean for the Accounting Firm of Today?
Other studies have discovered:
1. Cyber attacks against high profile businesses are on the rise.
2. Privacy issues when personal devices are used on a regular basis for communicating with clients.
3. The multitude of varied devices and their proliferation is now the top technology concern
45
Chapter 3: Mobile Computing
36
What Does all of this Mean for the Accounting Firm of Today?
Real or perceived:
The incidence of forgotten devices on airplanes has risen to the point that airlines are considering a public awareness campaign.
By 2020 it is expected there will be 10 billion mobile connected devices.
45
Chapter 3: Mobile Computing
37
What Does all of this Mean for the Accounting Firm of Today?
Smart Phone adoption rates are in excess of the growth curve that accompanied the rise of cell phones
46
Chapter 3: Mobile Computing
38
What Does all of this Mean for the Accounting Firm of Today?
The largest growth in bandwidth is in non-telephone usage
46
Chapter 3: Mobile Computing
39
What Should an Accounting Firmdo to Protect Themselves?
An imperative is to extend the computer use policy in our offices to these mobile devices:
Go to www.gearupseminars.com to view the computer use policy in the office of Carl Heintz
46
Chapter 3: Mobile Computing
40
What Should an Accounting Firmdo to Protect Themselves?
46
Chapter 3: Mobile Computing
41
What Should an Accounting Firmdo to Protect Themselves?
47
Chapter 3: Mobile Computing
42
Is It Time to Adopt an iPad or Other Tablet for Use as a Business Tool?
Should an accounting firm adopt an iPad or similar tablet device, the answer is:
There is no other way to practice right now.
OR
Why would a firm want to do waste firm technology resources on a toy?
47
Chapter 3: Mobile Computing
43
Is It Time to Adopt an iPad or Other Tablet for Use as a Business Tool?
Implementing the iPad or other tablet is not for the faint of heart
Particularly the iPad requires an “app” for a significant number of “business uses” that are not parallel to applications the business user will normally be experienced with.
47
Chapter 3: Mobile Computing
44
Is It Time to Adopt an iPad or Other Tablet for Use as a Business Tool?
An iPad or tablet is:
1. Not a heavy duty input device.
2. A great note taking or light duty device.
3. A consumer of information – Reading a book not writing it.
4. Will not be effective without taking time to pursue “apps” that work how you want the device to work for you.
47-48
Chapter 3: Mobile Computing
45
Is It Time to Adopt an iPad or Other Tablet for Use as a Business Tool?
Some additional observations about adoption of iPads and other tablets:
More accountants are carrying the devices and at the AICPA Technology forum attendees indicated more of their clients are carrying them as well.
The adoption rate seems to be picking up steam as 10% of AICPA members survey indicated they owned one for business or personal use.
48
Chapter 3: Mobile Computing
46
Is It Time to Adopt an iPad or Other Tablet for Use as a Business Tool?
A Thomson Reuters found 7% of its current Ultra Tax users are using tablets with another 5% planning to use with another 20% currently investigating their use.
Imagine having the client sign an 8879 that has been retrieved by an “app” from the accountant’s file.
48
Chapter 3: Mobile Computing
47
What does the iPad do Well?Travel – Small and Light
Meetings
Download files from Desktop
Lay flat helps with face-to-face encounters
Video Conferencing
48
Chapter 3: Mobile Computing
48
What does the iPad do Well?Second Monitor – Mirror what is on your desktop or laptop or as a second monitor to extend your desktop
Documents – With the use of Docs to Go and Good Reader or PDF Expert word and PDF documents can be read and edited.
Good Communicators – Easily synced to corporate exchange servers. WebEx or Go To Meeting for online meetings
48-49
Chapter 3: Mobile Computing
49
What does the iPad do Well?Taking Notes – Using apps such as Evernote, MobileNoter or GhostWriter which when team with cloud apps such as Drop Box will seamlessly transfer those notes to other devices.
49
Chapter 3: Mobile Computing
50
What does the iPad do Well?Some problems to overcome:
Security Issues
No Mouse
No Flash
No accounting software
49
Chapter 3: Mobile Computing
51
What does the iPad do Well?Increasingly software publishers for the accounting industry are making content available for the tablet computer.
50
Chapter 3: Mobile Computing
52
What does the iPad do Well?The decision, should we or shouldn’t we?
Negative - Cost – Will be in the $900 -$1000 area by the time you finish with apps and peripheral devices.
Positive - Portability – The big winner, gage the nature and character of the firm and the staff
50
Chapter 3: Mobile Computing
53
Top Software for the iPadThe favorites of your author:
Drop Box – Excellent cloud file storage and sharing medium.
DocsToGo – MS Office – Editor and allows direct reading of cloud storage such as Drop Box
GoodReader – An excellent PDF reader and editor
GhostWriter – Taking notes in the cloud
50
Chapter 3: Mobile Computing
54
Top Software for the iPadType Here
50
Chapter 3: Mobile Computing
55
Top Software for the iPadType Here
51
Chapter 3: Mobile Computing
Image courtesy of http://www.ipad-application-reviews.com/
56
Top Software for the iPadType Here
51
Chapter 3: Mobile Computing