08 Mar 2017 - {{hitsCtrl.values.hits}}
Sri Lanka now has more active mobile phones than people.
This is in keeping with trends in the global consumer electronics market, with falling PC and laptop shipments, but mobile phone shipments continuing to rise year on year.
This is because the mobile phone has transcended its original function of connecting people to each other and become a device that connects a person to the world. It is simultaneously our friend, insurance provider, bank, encyclopedia and even our taxi service, amongst a host of other essential functions. It is the one tool we cannot do without and commonly the one least protected. We sat down with Parvinder Walia, Sales and Marketing Director – APAC, ESET to get a better understanding of the need to protect the ubiquitous devices that almost function as a part of us.
Treasure trove
According to Walia, the mobile phone is a treasure trove of personal information. While many of us are aware of computer viruses, most are still oblivious to mobile phones as targets of cybercriminals, thus making us vulnerable to cyber-attacks. However, it is not only the individual that is in danger of having their information stolen but corporates too.
“In the past, there was a compartmentalization of information where employees would use a different laptop for work and at home. However, these days with the versatility of the mobile phone, many companies allow employees to use their own devices to access confidential business information on the go. This could severely compromise a corporate’s network if that device were to be taken over by a cybercriminal without the user knowing, resulting in corporate emails, logins and other sensitive data downloaded in that phone being stolen,” said Walia.
Looking for best return
Walia also pointed out that, like any other business, cybercriminals are looking for the best return on investment by developing attacks on the most popular mobile platform; the Android platform. Hence, this increases the problems in cyber security with Android malware. Ransomware, GSM trojans and spyware are some of the tools in a cybercriminal’s arsenal as they have been effective so far. Ransomware, as the name suggests, can hold sensitive information on, or stolen from, your mobile device for ransom. GSM Trojans inflate a user’s phone bill by calling or messaging premium rate numbers without the user’s knowledge.
And spyware, as you can imagine, looks for login credentials, emails, text messages, contacts, and locations on the user’s device and sends them to the attacker. In some cases spyware can also activate a user’s camera or microphone to live stream what the user is doing.
These are all major concerns which people often put it off, thinking it will not happen to them. Of course, Walia explains, the first step in safeguarding your mobile device requires installing mobile security software like ESET Mobile Security. This will protect your device in real-time from cybercriminals. It will continuously scan for threats, stop any spam, and keep you informed about vital phone functions to allow you to take action on the spot and reduce risk. These multiple layers of protection allow you to have control over your data and give you that added peace of mind.
“While it is important that we secure our devices, it is equally important to educate the consumers on the do’s and don’ts to protect themselves in the online world. There is a lot of personal information shared freely on social media that people are unaware how dangerous it is if it gets into the wrong hands. Our digital footprints are extremely hard to erase so we need to be extra careful in what we share and who we interact with,” said Walia.
He also pointed out that to minimize the risk of attack, people need to be more aware of their actions as they can be exploited by cybercriminals.
n Do not connect to insecure Wi-Fi networks as cybercriminals can use this to get into your phone.
n Do not click on banner ads that have dubious claims as this could redirect you to a sketchy website that compromises your phone.
n Do not tap on email or chat messages with links if you do not recognize the URL.
n Do not download apps from an unofficial store because while you might have saved a little money on the app, it is possible that the original code of the app has been replaced with malicious content.
n Always check what permissions you are giving an app before you install it, ask yourself if you are comfortable with providing and allowing an app to accessyour data.
Cybercriminals will continue to evolve their methods and tools, and as they become more sophisticated so must we. When it comes to cyber security, it is important to keep vigilant with the ever-changing landscape. That is why at ESET, methods are constantlyaudited to keep up with cyber security trends, and updated with new capabilities. However, despite how great a security measure might seem, nothing is 100 percent. Hence, in addition to installing mobile security software into your phone, it is also important to be aware of the various ways you can be targeted by cybercriminals, and be extra cautious on both online and offline.
24 Nov 2024 1 hours ago
24 Nov 2024 2 hours ago
24 Nov 2024 2 hours ago
24 Nov 2024 4 hours ago