jump to navigation

Mobile Security December 7, 2013

Posted by farchie82 in Security.
trackback

After reading the article, “10 Best Practices for Mobile Device Security,” [1] I am reassured that my constant attempts at securing my iPhone are not in vain. Astonishingly, “31,000 New Yorkers left behind mobile devices in a taxicab [and] most enterprise users don’t use the password function on their devices. I am constantly telling everyone from my fiancé’, to my co-workers, family, and friends to utilize the password function on their smartphones to protect not only the investment, but also their personal information. Phones are replacing the once needed computer for checking email and banking accounts, to watching video surveillance of your home. Choosing devices carefully, turning on encryption, requiring authentication, utilizing remote wipe capabilities, setting up a lost phone hotline, controlling third party apps, setting unique firewall policies, using intrusion prevention software, keeping an open mind about AV, and shoring up Bluetooth devices are the ten recommendations in the article for smartphone users. Even though I am persistent in my encouragement to others of locking their devices, I was shocked to find out that, “the ability to set a pin number to lock the device [with] a simple pass code won’t protect your phone from viruses or knowledgeable hackers.” [2] I was clueless to the fact that hackers can access your phone’s camera, contacts, SMS text messaging options and much more, so it is almost imperative to protect smartphones, whether for personal or business use, and other mobile devices. The problem of security seems to be a never-ending cat and mouse chase, and it is important that users stay on top of self-education. Simply updating software for a phone doesn’t seem to be enough anymore. Knowing what the latest trends are in spy and malware are very important as well. Users cannot simply rely on developers for PSA’s; personal accountability is key. Hackers are attacking devices from many angles, leaving phishing attacks, buffer overflows, and stack smashing no longer limited to computers. Investing in AV software for smart devices also seems to be imperative. The thing that I don’t understand, however, is why isn’t this new epidemic being talked about? I watch the news on different networks as well as various talk shows, and yet, I have yet to hear of this. I will be purchasing AV for my iPhone this week and also spreading the word.

[1] “10 Best Practices for Mobile Device Security”. By Ericka Chickowski. Posted 2009-02-26
http://www.baselinemag.com/c/a/Mobile-and-Wireless/10-Best-Practices-for-Mobile-Device-Security/#sthash.vzXqjIkI.dpuf

[2] “Why Mobile Security Software?” http://d2l.mu.edu/d2l/le/content/225135/viewContent/1286425/View

Advertisements

Comments»

No comments yet — be the first.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: