Before becoming the director of information services at Bush Gottleib law firm, Jose Quintero already have firsthand knowledge about how a lost smartphone can devastate a business. He worked for automated system analyst, a multinational company that has up to 700 attorneys spanning about 15 offices. Without Quintero’s knowledge, an attorney moved his photos, documents and data from his laptop to his iPhone without backing the information up. After a short while, the attorney’s laptop was attacked by virus and he lost the information in it and then he also lost his iPhone, leading to an absolute loss of the data.
As a result of the experience, Quintero ensured that he implements cloud-based security solutions provided by Marble Security in Bush Gottleib to ensure that phones and tablets are protected against loss and theft from Malwares. According to Quintero, sensitive information and data are carried along in mobile devices. With mobile security technology, you can lock your device when it is stolen and wipe out the information in it.
Mobile security is not unique to law firms as firms in other sectors like healthcare providers and so forth also handle sensitive data. According to a survey made by Check Point Software Technologies, 53 percent of the companies stored sensitive customer data on mobile devices and this is expected to increase with increase in mobile device usage. Many organizations are now going for BYOD “bring your own device” policies as it goes a long way to save them lots of money. There are many cyber threats facing businesses but these threats can be put under control if you really know how to go about it.
Threat 1 – malicious apps
Malicious apps are virtually everywhere in the internet. They come in disguised forms and look like genuine apps and games. When you download them to your smartphones or other devices, they will start sending messages to some numbers and also performing some other malicious activities.
To protect yourself, you should ensure that you download apps and games from trusted sources alone. Any site you are not really sure of should be avoided. Downloads should be made from sites like Apple App Store, Google Play and so forth.
Threat 2 – Malicious Mobile Sites
Nefarious people fake their URLs and use URLs capable of filling mobile browsers automatically in order to infect devices with their malware and spyware. According to Symantec, a security firm, about 61 percent of malicious websites we have today are merely legitimate sites which have been transformed with evil codes.
To guard against this menace, you have to make bookmarks of the sites you use always. When you want to search information on other sites, put in their URLs manually and also apply caution and be careful when opening a hyperlinked site.
Smishing, a means of phising based on SMS, is used in sending links to a malicious site together with text messages. This is designed to gather personal information of the victims. Such information includes the customer’s bank account details and data.
To protect yourself and guard against this menace, you should not click on links in text messages most especially when the text message does not come from a source you can recognize. In addition, text messages that ask for your personal data should be suspected and avoided. There is no need of responding to such messages in the first place. Text messages coming from numbers that are not the conventional formats should also be suspected and avoided. This is especially the case with text messages coming from “5000”.