The Silicon Review - Best Business Review Magazine 10 Best Security Companies 2019 | Page 51
circumvent data security measures
using smartphones as their
doorway.
Let’s explore some of
the most common ways
in which sensitive data
from mobile phones can
be compromised:
Inadvertent permissions
As silly as it may seem, most users
leak data inadvertently, believing
applications to be trustworthy.
Almost every single mobile app
requires access to user data on one
level or another. “The main challenge
is how to implement an app vetting
process that does not overwhelm the
administrator and does not frustrate
the users,” says Dionisio Zumerle,
research director for mobile
security at Gartner. There are
numerous solutions and software
for avoiding applications-centered
data leakage. Such measures have a
comprehensive way of vetting apps
and determining which ones may
pose a threat, and to what levels.
It is extremely important that
everyone from the casual user to
working professionals who access
sensitive data take certain simple
measures like not granting access
permissions to applications from
unverified developers and taking
care not to save any corporate
information on their phones.
Masquerading and Phishing
It is one of the oldest and most
common ways used in the theft of
data. In spite of all the numerous
security features and anti-virus
software available and widespread
awareness regarding data security,
a disturbingly large number of
smartphone users fall for this and
end up disclosing confidential
information to the wrong person.
Most of the mobile applications for
emails only display the name of the
sender and no other information.
This is a common trick used by
a number of con artists to get
unsuspecting people to respond
to emails asking for personal
information.
Phishing also remains the most
common technique used by hackers
to get users to reveal highly
sensitive personal information like
user names, passwords, credit card,
and banking information and so on.
This is simply because almost every
working professional opens up a
new email on their phones, rather
than desktops. This makes mobile
internet pages attractive targets
for hackers to replicate and steal
information.
Unsecured networks
With so many mobile applications
offering a plethora of utilities,
combined with the pervasive
addictiveness of social media,
people are more likely to browse
the internet on their phones while
on the move. This greatly increases
the likelihood of connecting to
unprotected internet hotspots.
Two or more people exchanging
messages over an unsecured
Wi-fi risk their messages being
intercepted by an unknown person.
Such messages may contain
confidential information that could
either be personal or official. In
cities with free public Wi-fi, the
chances of information being
viewed by an unintended person
increase drastically.
of the biggest threats to information
security, in spite of warnings and
notifications for improving the
strengths for the same. Techniques
used to gain access to a secured
system range from guessing
of passwords to hacking using
advanced tools. However, such
methods are rendered difficult if the
passwords are at least 10 characters
long and consist of letters, numbers
in addition to symbols.
With the right system hacked,
cybercriminals can siphon off
large amounts of mission-critical
corporate data that could cause
millions of dollars in damages
and require months for recovery.
Additionally, entire networks
and public infrastructure can be
compromised if key officials don’t
take adequate precautions.
The information age that we live
in demands that we consider
information as important resources,
as something precious to be
protected. The struggle between
hackers and cybersecurity measures
is a constantly evolving one and
everyone must be constantly
vigilant or end up as hapless victims.
SR
Weak passwords
Although this does not seem like
a likely reason for theft of data,
repeated surveys carried out
by various organizations have
suggested otherwise. This problem
is made worse by the fact that
personal, as well as official or
corporate information, can all be
accessed from a smartphone on the
go. Weak passwords for personal
devices and login portals remain one
APRIL 2019
51