Click me
Transcribed

Mobile Security Monster Mash

MOBILE SECURITY MONSTER MASH MOBILE SECURITY DANGER 1111111 84% of consumers use the same smartphone for both business & personal use 66% of consumers admit they keep a significant amount of personal data on their smartphone 38% of consumers use smartphones to make payments 5 29% of consumers have considered installing an anti-virus product to protect their phone 42% of consumers allow their smartphone to store their passwords and log-ins for well-known social networking applications 14% of consumers use their smartphone for online banking Smartphones have become a target for private data and are prone to hackings, scams and theft. Now, privacy protection is becoming a necessity to avoid malicious attacks. 10 MOST COMMON MOBILE SECURITY MONSTERS DATA REAPER Preys on unlocked or unprotected smartphones to steal personal data such as your name,age, emall, postal address, bank account, and credit cards detalls. • Enable "remote swipe" functionality to delete the contents of your smartphone if it's lost or stolen. • Install a password to lock your phone, WEAKNESS THE UNWANTED GHOST Sends out unwanted software and links • Use caller ID (or a pinch of salt) to block incoming calls or texts from sketchy, unknown sources. through text messages on smartphones causing addlitlonal charges on phone blls. • Never respond to or follow any links in a text sent by an unknown party. • Monitor your phone bil. WEAKNESS • THE IMPERSONATOR • Monitor your bank account to make sure no unwanted transactions are made. Appears to be a legitimate payment app, but actually steals personal Informatlon lke your account numbers and passwords. Also creates unwanted transactlons Involving your bank account. Look for the "S." Only enter account or credit card information on a site that begins with "https:" or displays alock symbol, • Pay attention to security pop-up nofices that warn against potential threats. WEAKNESS BLUETOOTH BANSHEE Invites hackers to remotely access phones that are In range by taklng advantage of the Bluetooth discovery mode. • Set default Bluetooth configuration to "non-discoverable" mode. WEAKNESS• JAIL BREAKING MUMMY • We know it's tempting, but don't jail break phones. Glves you access to hidden features or unofficlal apps, but undermines smartphone operating systems maklng way for potentlal Infections by malware. WEAKNESS THE EAVESDROPPER • Limit the type of business you conduct with your phone such as anything that requíres your bank account. Lures smartphone users In with a shared, unsecured wireless connection that leaves data vulnerable to theft. • Adjust security sottings on device to limit who can access your phone. • Avoid using shared, unsecured wireless connections. WEAKNESS • CRAFTY WITCH • Be thorough in configuring privacy settings on your phone and apps you download. Spreads viruses on smartphones Just as easy as computers. May slow down your phone's processing speed, hack your emall, delete contacts or Inttiate system-wlde crashes. • Download apps only from legitimate app stores, and read the reviews before buying to make sure there is no buz dbout a virus attachedwith the app. Don't open attachments from people you don't know. • Nover click on questionable links. WEAKNESS THE INFECTED ZOMBIE • BullGuard and Lookout are the best security software programs to stop malware dead in its tracks. Infects smartphones by malware through an Internet connection, connectlon to an Infected PC or Bluetooth connection. WEAKNESS • RISKY WEREWOLF SILVER Stegls sensitive data -- such as banking and payment system PIN numbers, credilt card Information and online service passwords - from SD cards or memory sticks. • Most smartphone platforms offer software to encrypt files on the device (a code must be entered before a file can be viewed copied). • Store sensitive data remotely on secure online servers WEAKNESS WICKED VAMPIRE • Carefully read the terms and conditions of apps you download to learn if the app will fransmit your personal information. If so, opt out. • Use anti-virus software and be mindful of apps you are downloading. Automatically downloads apps on smartphones leaving devlces susceptible to malware-laden apps. Sends smartphone owner's personal Information to advertisers without notificatlon or permission of user. WEAKNESS • O SEO.COM #1 in Search Engine Optimization SOURCES 1. StaySafeOnline.org -http://www.staysafeonline.crg/stay-safe-online/mobile-and-on-the-go/mobile-devices 2. Huffington Post.com - http://www.huffingtonpost.com/2011/11/29/mobile-security-and-privacy-breaches_n_1117879html 3. AdaptiveMobile.Com - http://www.adaptivemobile.com/press-centre/press-releases/angry-birds-know-where-you-live 4. OWASPOrg - https://www.owasp.org/images/9/94/MobileTopTen.pdf 5. Tech Republic.Com- http://www.techrepublic.com/blog/smartphones/smartphone-enterprise-security-risks-and-best-practices/1935 6. StaySafeOnline.Org - http://www.staysafeonline.org/stay-safe-online/mobile-and-on-the-go/mobile-devices 7. SmallBusinessComputing.Com - http://www.smallbusinesscomputing.com/webmaster/article.php/10732 3931201_3/Top-10-Smartphone-Security-Tips.htm 8. AVG.Com Smartphone Security Study by Ponemon Institute - http://aa-downloadavg.com/fledir/other/Smartphone.pdf 9. McGladrey.Com - http://mcgladrey.com/pdf/the_smartphone_and_its_riskspdf 10. BullGuard.Com- http://www.bullguard.com/bullguard-security-center/mobile- security/mobile-protection-resources/8-ways-to-keep-your-smartphone-safeaspx 11. MyLookout.Com - https://www.mylookout.com/resources/know-your-mobile/mobile-banking-security 12. Mobile-Security-Software-Review.TopTenReviews.Com - http://mobile-security-software- review.toptenreviews.com/smartphone-smarts-protecting-your-phone-from-malware.html 13. Anti-Virus-Software-Review - http:/lanti-virus-software-review.toptenreviews.com/mobile-phones-are-under-malware-attack.html 14- NbcNews.com-http://www.nbcnews.com/technology/technolog/creepy-android-malware-records-your-phone-calls-121742 15. Share.Org- http://www.share.org/p/bl'et/blogid=28blogaid=147

Mobile Security Monster Mash

shared by prmarketing on Oct 22
232 views
0 shares
0 comments
Is There a Mobile Security Danger? And are you in danger of malicious attacks? Smartphones have become a target for private data and are prone to hackings, scams, and theft. Now, privacy protection a...

Publisher

SEO.com

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size