strip

Must See Cybersecurity Myths Busted! Part 1

Want to know what the top 5 cybersecurity myths are that could help you stay safe out there in cyberspace? Stay tuned as we reveal the five cybersecurity myths and we bust those with the reality. You’ll also receive some handy tips to help you stay safe while on that mobile device.

The first myth is “viruses and other malicious software also known as malware only affect computers: desktops and laptops”. But viruses and malware not only affect computers, but they also can affect smartphones, tablets, and other mobile devices.

What are Mobile Security Threats?

People don’t think about their mobile devices being at risk for security threats but it’s a rising occurrence. There are several security threats for mobile devices that you should be aware of.

The four threats to mobile devices are:

1) Physical

2) Application-based

3) Network threats

4) Web-based threats

Physical threats occur when someone finds or steals your mobile device and in this case, the hacker has direct access to the hardware where any of your data is stored or accessed. This can be very dangerous for anyone who carries a business mobile device.

Application-based threats occur when the user downloads applications that may look real but steal data from their devices. This can happen when spyware and malware steal personal and/or business information from a mobile device without the user even knowing.

Network threats occur when cyber-criminals steal unencrypted data when a user is using the public WLAN which is a much more serious threat!

Web-based threats occur when the user visits affected sites that look may look good in the front but download harmful viruses to the device. This is a threat that is more subtle and generally not interested in the user.

How to Minimize the Exposure of Your Mobile Device to Security Threats?

Use Strong Passwords and Biometrics

Strong passwords coupled with biometric features such as fingerprint or facial authenticators make unauthorized access almost impossible.

  • Passwords should be eight or more characters long and contain numbers and symbols.

Ensure Public/Free Wi-Fi Is Protected

Any public or free Wi-Fi points are not encrypted and can allow malicious people to eavesdrop on the network to obtain users’ personal data. This threat of Wi-Fi hacking is a growing risk and is probably not going anywhere anytime soon.

  • Use applications to secure your Wi-Fi connection
  • Know the status of the Wi-Fi that you are connected to (example: WPA (Wi-Fi Protected Access) is more secure compared to WEP (Wired Equivalent Privacy))
  • Turn off wireless connectivity when you are not using them (avoids automatic connection to unsafe networks)

Utilize a VPN

Use a VPN (Virtual Private Network) to connect to a network securely. By using a VPN you prevent yourself from attacks while being on a public Wi-Fi or by visiting Non-HTTPS sites that can be visible to anyone.

Encrypt Your Device

You can utilize the built-in encryption feature which makes data unreadable.

  • Locate the feature on your mobile device and enter a password to encrypt your mobile device
  • Make sure you remember the encryption password as it may be required every time you use your mobile device.
  • To be safe, back up your data since some mobile devices will delete everything if the wrong encryption password is entered a certain amount of times incorrectly.

Update with Latest Software

Your mobile device can be more susceptible to threats if you do not update it from time to time. The updates can be a security patch to any known threats on your device.

Use a Mobile Device Management system or MDM

An MDM is useful to help manage phones to make sure they aren’t improperly configured for your security policy and can assist in removing company data from the phone in case the phone is lost or stolen.

Get Help with Mobile Device Security from Triada Networks

Triada networks have over two decades of experience providing secure IT solutions to businesses in NYC and New Jersey, and we specialize in the distinct data security requirements of financial services firms.

Want to know how your mobile security strategy stacks up? Contact us today for your free IT Security Report Card at 201-297-7778 or through our website form.

Resources:

“Top Mobile Security Threats Of Digital Era”. CyberWarZone. https://cyberwarzone.com/top-mobile-security-threats-of-digital-era/

TripWire Guest Authors. “How to Secure Your Mobile Device in Six Steps”. Tripwire. 2016, Nov 23. https://www.tripwire.com/state-of-security/security-data-protection/secure-mobile-device-six-steps/