The threat is becoming more and more relevant each and every day. Basic precautions with your mobile device are no longer sufficient. There is a real need for mature mobile device anti-malware protections. Also, mobile device management can provide a limited mitigating control.
Here is some excellent advice on mobile device security from the team at Securing the Human.
Mobile malware is a growing concern. Though still a small slice of the overall malware infection pie, the threat is growing at an alarming rate and it certainly warrants our attention.
The article discusses a fear many of us have – the spread of ransomware to the mobile device. Many individuals are more bound to and reliant on their smartphones and tablets than they are to their desktops and laptops and servers. We need to address the threat and be prepared.
This is some sound mobile device management advice for your Friday afternoon. All of us face the fun challenge of upgrading and replacing mobile devices on what seems to be a fairly frequent basis. Take heed of this advice before you trash or resell your old smartphone or tablet.
There are some staggering statistics in the Ericsson Mobility Report, specifically around the growth in number of devices used and the amount of data projected to be consumed. Take a moment to consider the security of your mobile devices. How easily can you lose valuable data through the loss or compromise of your smartphone or tablet? There are strong options for mobile device management and security, so take the time to make good decisions now.
Staggering is a good word to describe the stats in this article. This is truly a massive amount of data. And it brings to mind a very important question – how secure are all those mobile devices? Please take the time to consider the security of your mobile devices. We are no longer tethered to a CAT5 cable and the bad guys know that. Are critical data is traveling with us and it needs to be safe and secure.
I would personally love to see and read through the responses to this inquiry by the FTC. I am hopeful a public record matrix is provided. This type of information and the changes that come from a public forum discussion are invaluable to the cause of better security patch management for mobile devices.
This is a particularly scary attack vector given that many people believe their mobile devices immune to malware and other attacks that can compromise their internal environment. Once you get to the router, you can own the entire network.
These statistics are staggering, especially considering the wealth of strong and easy to deploy mobile device management platforms on the market. This issue is partly due to a lack of communication and and understanding. The rest of the problem firmly lies in the realm of ease of use and ego.