Mobile Security

Image result for mobile security

(Connected Writing)

What weights two pounds, costs $4,000, and became really popular in 1983? The Motorola Dynatac 80000X (A.K.A. the “brick”), the truly first mobile phone. It might seem strange to some youngsters, but the only thing you could do on a cell phone was make phone calls (usually unreliable ones at that). Things have really changed since 1983. Mobile devices have become a ubiquitous obsession thanks to all that they can do. Today, people can browse the internet, send emails, check online banking, and chat with people they hardly know; everyone does it—from toddlers to the elderly. But the more information we share, the more other people can get a hold of our data.

Blakely Thomas-Aguilar shared in her blog, 23 Disturbing Statistics about Mobile Security, points out that there are a lot of alarming statistics around mobile security. In 2014, 1,023,108,267 records breached were breached with 25 percent of ALL mobile devices encountering some threat each month. She says, there is “nothing scarier for IT teams than mobile cyber security…Given the pace of mobile innovation and low barrier to entry for creating a mobile app, both apps and operating systems are full of vulnerabilities.” She points out that the majority (56 percent) of enterprises working to counteract cyber threats, citing that they are unlikely to detect a sophisticated threat. And because cybercrime has grown to a multi-million-dollar industry, she suggests that there is enough information to invoke fear and “cause us to leave the lights on at night.”

Yes, mobile security is a complicated and serious issue that shouldn’t be ignored or brushed aside. If you want more information about how you are vulnerable to cybercrime on mobile device, I recommend checking out the Wikipedia article on Mobile Security. Otherwise, continue reading to learn about the most common mobile security myths that need to be debunked.

Mobile Security Infographic_Haunting Reality_AirWatch

Mary E. Shacklett, the president of Transworld Data, says that while mobile devices have introduced plenty of legitimate concerns, there are some misconceptions floating around causing some people to focus or ignore the real risks. Her blog 10 mobile security myths that need debunking, is intended for It security managers, but it’s also helpful for “normal” people like you and me. I won’t get into all the myths, but here are the most important take-aways.

Removing encryption can lead to unforeseen consequences. The localized storage enables you to keep working outside the cloud, and it’s this reason that encryption should be kept intact, says Shacklett. Additionally, she says that mobile security should not be any less robust than our desktop devices. Laptops and desktops aren’t necessarily more secure than mobile devices. “Mobile devices have small data footprints, using the cloud to store data.” While laptops counterparts have hard drives full of data, mobile device usually have less data store on them. As a result, there is less amount of exposed information that can lead to security breaches on mobile devices. The main point, don’t underestimate what you have on your mobile device or laptop, they both contain certain sensitive information putting your data at risk.

Mobile technology is constantly full of new innovations making the issue or security one of the most challenging frontiers for people to understand. This blog is intended to get people thinking about the issues around mobile security and cut through the bullshit. It’s a serious and complicated issue that affects anyone using a mobile device.

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s