Each and every day in 2013 brings a new set of surprises to the
hyper-connected population roaming the global cyberland. Mobile
connectivity is exploding and smartphones and tablets are whetting the
appetites of cyber criminals and the population of hacker world. Any
device that has information stored on it is vulnerable as the
fast-evolving technology for mobile phones makes it much easier for
hackers to spread their mobile malware.
There are a plethora of security solutions on the market but the
stubborn fact is that a high percentage of mobile phone users remain
lackadaisical when it comes to preventing attacks on their devices. For
example, McAfee has reported that about 36 percent of smartphone users
do not use password protection. There are no silver bullets in the
cyber security solutions goody bag and being lazy about fundamentals and
sharing details of passwords makes for a field day of malicious hacks
and network infiltrations. These days it seems like cyber crime is in
the headlines on a daily basis.
Hacker communities are close to "state of the art" in miscreant behavior
and professional programmers are behind many of the attention getting
hacks. The HP Cyber Security Risk Report of 2012 finds that mobile phone
vulnerabilities are growing dramatically. Mobile phone risks are more
pronounced, state numerous entities around the globe, making the problem
a persistent aggravation and more than a major concern for businesses
and governments. One statistic has mobile malware jumping some 80
percent last year making it highly possible that all enterprise networks
are in jeopardy. The largest target, the financial industry, receives
hundreds if not thousands of threats on a daily basis. Feature rich
mobile devices generate revenues for criminals. Stolen data brings huge
financial rewards.
Cyber miscreants will continue attacking mobile phones in larger and
larger numbers. Again, the motivation is simple. The information
contained on storage devices easily converts to money making revenue for
hackers. As network security continues to deteriorate, legacy systems
will remain impossible to secure. Mobile is different from a security
perspective. Microsoft Windows deployments have been in large demand in
the business world and security solutions have largely been developed
around this fact.
But mobile's operating systems are very different architectures from
Windows. Architectures greatly impact the attack matrix. Today
international behaviors breed mobile malware and any software running on
a mobile device is an entry point for hackers. Bring Your Own Device
(BYOD) is a strategic development in the marketplace and like your
computer, mobile devices will "always" be on the network. The virtual
world requires new thinking of the security paradigm. With constant and
rapid evolution in the mobile device space it is truly Trick or Treat
each and every day.
No comments:
Post a Comment