Friday, June 29, 2018

Mobile Device Management Vendors Share 6 Security Risks to Avoid

For businesses that use the Internet in their day-to-day operations—which is practically everybody—online security issues are a primary concern. With the ubiquity of smartphones, tablets and laptops comes security threats that grow with each passing day.

Unfortunately, many organizations remain unaware of the various threats that lurk online, and because of this, they are ill-prepared for relatively minor attacks, much less major breaches. With this in mind, mobile device management vendors name the top six mobile security threats you should take seriously to help keep your business protected.

Phishing

Cyber criminals use phishing to steal vital financial information like user credit card and social security numbers, user login credentials, and more. Emails are the usual tools of the phishing trade. Phishers make emails appear legitimate so users will take the bait and hand over their sensitive information without a fight.

Malware

Malware often works by triggering a malware window that overlaps with legitimate websites. Employing a method similar to phishing, these windows trick users into giving their sensitive information, compromising their mobile device in the process. Aside from stealing information, malware can be used to spy on user activities and obtain browsing habits, which can be used for blackmail and other criminal practices.

Outdated OS

Operating systems (OS) constantly need to be updated to fix vulnerabilities in the mobile system, among other reasons. The problem is that these updates often occur at the most inopportune times and can be an annoyance, and so it isn’t unusual for users to postpone if not forgo them altogether. However, ignoring or blocking OS updates can leave a device vulnerable to malware and other threats to security and privacy.

Data leaks

When users make wrong choices about the apps they use, they open themselves up to the risks of data leaks. Many legitimate apps have untested security measures, and thus are vulnerable to attacks. Apps downloaded from unauthorized third party sources are especially prone to this problem.

Unsecured Wi-Fi

Wireless hotspots let you use the Internet for free, so who can resist them? But as with anything that’s too good to be true, hotspots are usually unsecured. Many have fallen victim to hacking via unsecured networks, losing their social media, VoIP conversations, and even their PayPal accounts to hackers. Security professionals warn against using free Wi-Fi to access personal and confidential services.

Unattended devices

‘Don’t leave your belongings unattended’ is always good advice. If a smartphone gets lost or stolen, particularly for those who share passwords across devices, there’s no telling where the personal information it contains could end up.

The takeaway from all of these? You can’t leave the responsibility of protecting your employees’ mobile devices in their hands alone. The key is to implement security policies that work, and in this department, partnering with the right mobile device management vendor can help immensely.