jump to navigation

Mobile Security Practices and Software December 12, 2013

Posted by markwhylie in Security.

Mobile security is actually a very interesting and one of my favorite security topics. Primarily because I believe it will be one of the most important aspects of the “Internet of Things” as we move into the future. These days we find that there is a transition from standalone desktops to mobile computing as in the case of Apple “I” series devices, Samsung Galaxy series mobile phone and tablets and various other options from Microsoft. With that said, I think that it is important that we do not treat this new rush of technology with the same respect as we would treat desktop and distributed computing systems. If we do, we have the potential of essentially re-introducing problems such as the famous buffer overflow hacking techniques in the emergence of the UNIX system and the C programming language.

Some best practices that I believe will be essential as an end-user of mobile computing involves being educated and using common sense, being aware of what network your device is communicating with and through, placing passwords around critical applications, and also utilizing remote wipe capabilities just to name a few.

In these days, especially with the influx of older senior citizens transitioning to iPads and Android devices, we see that many tend to use these devices to store and access important financial information. While this seems to be good, it also has its downfall. If a user is uneducated and falls in a trap where someone easily steals their financial information, ignorance cannot be used to mend the broken wounds. It is important that we educate people on the security threats to using mobile computing especially when it is connected to a wireless network. We should educate people on the importance of communicating over an encrypted connection, placing passwords around accessing the device and even around certain applications such as banking apps. It is also important to ensure that we educate individuals on the importance of having the capability of remotely wiping data from a device in the case that it is lost or stolen.




No comments yet — be the first.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: