Practices to Mitigate Vulnerabilities Associated with Mobile Convenience

Contributed by LoyCurtis Smith

As the innovation in the information age continues to sculpt the norms in everyday life, we unknowingly become more vulnerable to cyber threats. In the sake of communication, mobility, and convenience mobile devices have allowed us to tackle personal, business, and educational tasks on the go, which in the past users were only capable of doing such while stationery. This convenience, this mobility, this multitasking has also enabled us to become more vulnerable in regards to being exploited by malicious individuals and having information taken from us. The average user is not trained, informed, nor tech savvy enough to know how to slightly protect themselves. Their banking information is on their mobile device, they have apps that allow them to monitor and control their home, and unlock their car, all of which can easily be exploited by a hacker. Users also have the tendency to connect to free Wi-Fi to surf the net or connect to Bluetooth devices for answering calls and/or listening to music while driving or working out in the gym. Unknowingly users could be connecting to evil twins opposed to Starbucks’ free Wi-Fi as well as opening themselves up to rogue Bluetooth connections. Ultimately our convenience creates a convenience for the opposition.

This document is in PDF format. To view it click here.

Rate this article: 
No votes yet