Viruses threaten mobile devices

COMPUTING

|
Image: By BiztechAfrica
Viruses threaten mobile devices

By Fred Mitchell, Symantec Business Unit Manager at Drive Control Corporation

The world has become increasingly mobile over time and technology has evolved so that cellphones have become smartphones, along with tablet PCs and other mobile devices allowing always on connectivity. Such devices have revolutionised the way we work and have grown exponentially in popularity in recent years, largely due to the fact that these mobile devices all feature Internet connectivity, opening the ‘Pandora’s box’ so to speak. 

This connectivity opens up new avenues for cybercriminals with malicious intent to exploit users. Therefore, security applications for mobile devices can be regarded as the next killer app.

In the cybercrime industry, as with any profitable business, the smart enterprise goes where the customers are. As more users migrate onto a variety of mobile platforms, from BlackBerry to Android, Windows Mobile, Apple Mobile OS and even tablet devices, cybercrime is increasingly targeting these platforms as methods for the perpetration of a variety of malware, including viruses, spam and spyware, all with the express purpose of making money.

Enter the virus killer app for your mobile device

Users are now vulnerable to viruses that can shut down their smartphones; identity theft as a result of spyware and the entire gamut of threats that were once the exclusive realm of computers. As a result, mobile security is becoming increasingly important for users to protect themselves from falling victim to malicious activity.

Aside from the threat of malware, the increasing trend towards mobility along with tools such as push email functionality also means that more and more personal and business information is now stored on highly portable devices. The greater the levels of portability, the greater probability that the device, and the information it holds, may be lost or stolen. Having personal and business critical information falling into the wrong hands is undesirable for obvious reasons, and the ability to remotely wipe the device in the event of it being misplaced is another strong reason as to why mobile security is so important in today’s world.

What to do?

When looking for a mobile security solution to protect devices such as smartphones and tablets from malware and to ensure personal information does not fall into the wrong hands, there are several features to look out for, which take care of security in the event of loss or theft and also help to prevent malware attacks from causing problems on the device and prevents cross-infection of other devices.

Remote locking capability is one crucial feature, which lets you remotely disable a lost or stolen phone to prevent strangers from accessing private information.  It also prevents thieves from actually using the device, so that they cannot run up large phone bills at your expense. This, combined with SIM card locking capability, which instantly locks your phone if its SIM card is removed so thieves cannot use it with a different SIM card, ensure that even if your phone is stolen, the thieves will not profit from it as the device is effectively rendered unusable.

Remote wipe is also critical, as this lets you actually erase all of the information contained on your phone if it is lost or stolen, including contacts, text messages, call history, browser history, bookmarks, and any data on the phone’s memory card. Mobile threat protection will detect and remove malware such as viruses and other threats without affecting phone performance, and download threat protection will automatically scan all files and app updates for threats.

Aside from these now vital security components, a comprehensive mobile security solution also lets you block calls and text messages from specific phone numbers, perfect for getting rid of annoying spam SMS’s and unwanted callers.

Mobile devices are increasingly common, which makes them more and more vulnerable to attack. Protecting all of the personal information stored on your mobile device is of the utmost importance to prevent all too common issues such as identity theft, and mobile security is no longer a nice to have, but a necessity for both consumer and business users in the modern world. 



Share the News

Get Daily Newsletter

comments powered by Disqus

MORE COMPUTING NEWS

Cloud, Mobility, Big Data to shape North African IT in 2015

The North Africa region will push ahead with IT transformation initiatives throughout the course of 2015, spurred on by growing adoption of '3rd Platform' technologies such as cloud, mobility, and Big Data, says IDC. Read More

One Channel Botswana acquires top technical skills

As part of its future growth strategy, One Channel Botswana has announced that it is acquiring top industry skills.  Read More

Cloud - the perfect weapon for SMEs

Cloud Computing gives smaller companies unprecedented access to enterprise-grade software and infrastructure services – allowing them to grow rapidly and compete with larger, more established competitors, says T-Systems. Read More

AfDB, MasterCard to expand financial inclusion in Africa

The African Development Bank (AfDB) and MasterCard have announced a broad collaboration that aims to expand financial inclusion across the African continent by broadening access and usage of digital financial services. Read More

Partnership expands ICT support for Ebola fight in West Africa

Collaboration among NetHope, Facebook, the Paul G. Allen Family Foundation, Cisco, EveryLayer and Inveneo will provide sustainable Internet connectivity solutions to support frontline response efforts and long-term recovery in Sierra Leone, Liberia and Guinea. Read More

IT hiccups put Botswana varsity in disarray

Botswana’s biggest university, the University of Botswana (UB) has been hamstrung by an IT problem that threatens to throw the institution into disarray. Read More

Soronko Solutions takes Tech Needs Girls programme to deprived regions in Ghana

Over 300 girls in the Upper West region of Ghana will be receiving hands-on education on ICT, thanks to the Soronko Solutions Road show known as the Tech Needs Girls programme.  Read More

Mascom to hand over Kitsong centres

As has become tradition, this year, Mascom will hand over ten Business Communication Centres, popularly known as Kitsong Centres. Read More

Hot five tech trends for 2015

In2IT Technologies South Africa predicts this year’s top five tech trends. Read More

Human interface services revenue to break billion dollar barrier within 5 years

Juniper Research says that by 2019 the global market for services based on gesture and biometric interface technologies will be worth an estimated $1.2 billion. Read More

PRESS OFFICES

Sage ERP AfricaSAP AfricaSage Pastel AccountingTrust PayVMWareSamsung ElectronicsMitsumi DistributionPhoenix DistributionMTN BusinessSchneider ElectricMultichoiceMicrosoft 4Afrika

FEATURED STORY

UCC launches 2015 ACIA awardsUCC launches 2015 ACIA awards

Uganda has launched the fifth Annual Communications and Innovation Awards, which celebrate and foster ICT innovation and achievement.

IN DEPTH

Kenya’s digital TV battle hots up Kenya’s digital TV battle hots up

Kenya’s journey to Digital TV broadcasting took a new turn this week, when the Communication Authority of Kenya (CAK) accused three local media firms of intent to disrupt the process.

COMPANY NEWS

Albany CTG, Microsoft, collaborate on School of Government Program

The University at Albany’s Center for Technology in Government (CTG) has announced its collaboration with Microsoft Corporation to deliver executive level training to government leaders in Africa ...

VMware reports fourth quarter and full year 2014 results

VMware, the global leader in virtualisation and cloud infrastructure, has announced financial results for the fourth quarter and full year of 2014.

MTN to empower African businesses with AWS Direct Connect

MTN Group today announced it would be the first African company to offer Amazon Web Services (AWS) Direct Connect to business customers across multiple countries on the ...