Dane Morgan on Mobile Security : A Guest Post

Stumble Upon Toolbar
 Today we have a Guest Post by one of the popular Blog Catalog names Dane Morgan, Dane has started a new venture on freelance articles and reports.. I requested him for the more increasingly important topic of security concerning our Mobile Phones and since security being an important theme within the sphere of technology on this blog. Here's is his valuable insight into the issue.


Constantly increasing computing power and the data storage that comes with it, combined with increasing speeds of 3G networks are making mobile devices more attractive to hackers, spammers and scammers as the rewards are rising faster than the risks. - Dane Morgan

                    Until recently Mobile Security hasn't been taken very seriously by most mobile users and the companies that employ them, but that is changing.

Research has shown that a good majority of lost or stolen mobile devices contain confidential personal and company information and communications that can be used to target the employee or the company for fraud and other mailcious attacks.

Additionally, Mobile security is moving rapidly towards similar methods to those used to protect PCs, such as firewalls, anti-malware and virus detection.

At this point most experts agree that mobile security measures are required on every smartphone to protect agaisnt malware. malicious software that infects a mobile device can cause false billing, disclosure of sensitive stored information, and can be used to delete, corrupt, modify or steal personal and company data stored on the device.

The biggest threats mobile users face today really centr around:
  • Privacy when they access the internet through a WiFi connection
  • Data protection in the face of a malware attack
  • Data loss and compromise when when a mobile device is lost or stolen
  • SMS spam, which a steadily growing number of users report as a problem.

Constanly increasing computing power and the data storage that comes with it, combined with increasing speeds of 3G networks are making mobile devices more attractive to hackers, spammers and scammers as the rewards are rising faster than the risks.

Some protection methods include using passwords, data encryption, spam filters, antivirus software and firewalls. But the real first line of defense in mobile security is an educated user.

  • Mobile users should avoid visiting websites that they are unfamiliar with or that they may not really have a reason to trust.
  • Install a security solution that provides anti-virus and firewall functionalities.
  • Don't open strange or unexpected MMS you receive, even from people you know.
  • Keep your Bluetooth connection hidden at all times.
  • Never install an application from a mistrusted or completely unknown source.

Anti-virus and anti malware solutions should automatically retrieve newest updates whenever any data connection is used, and use advanced SMS update mechanisms for critical updates when a data connection is not available.

Users should also take advantage of new technologies that allow for storage of sensitive data on a removable card that becomes inactive when inserted into a different phone. There are also mobile security systems available now that can disable smart phones and even lock down or delete stored information in the event that they are lost or stolen.

Mobile security is important in this day and age. It is up to both companies and those who work with them to take mobile security seriously and develop a security plan for their mobile devices and the sensitive information that contain.

Dane Morgan is a freelance writer and web designer. Visit his portfolio of freelance articles and reports.

0 comments:

Post a Comment