Viruses threaten mobile devices

COMPUTING

|
Image: By BiztechAfrica
Viruses threaten mobile devices

By Fred Mitchell, Symantec Business Unit Manager at Drive Control Corporation

The world has become increasingly mobile over time and technology has evolved so that cellphones have become smartphones, along with tablet PCs and other mobile devices allowing always on connectivity. Such devices have revolutionised the way we work and have grown exponentially in popularity in recent years, largely due to the fact that these mobile devices all feature Internet connectivity, opening the ‘Pandora’s box’ so to speak. 

This connectivity opens up new avenues for cybercriminals with malicious intent to exploit users. Therefore, security applications for mobile devices can be regarded as the next killer app.

In the cybercrime industry, as with any profitable business, the smart enterprise goes where the customers are. As more users migrate onto a variety of mobile platforms, from BlackBerry to Android, Windows Mobile, Apple Mobile OS and even tablet devices, cybercrime is increasingly targeting these platforms as methods for the perpetration of a variety of malware, including viruses, spam and spyware, all with the express purpose of making money.

Enter the virus killer app for your mobile device

Users are now vulnerable to viruses that can shut down their smartphones; identity theft as a result of spyware and the entire gamut of threats that were once the exclusive realm of computers. As a result, mobile security is becoming increasingly important for users to protect themselves from falling victim to malicious activity.

Aside from the threat of malware, the increasing trend towards mobility along with tools such as push email functionality also means that more and more personal and business information is now stored on highly portable devices. The greater the levels of portability, the greater probability that the device, and the information it holds, may be lost or stolen. Having personal and business critical information falling into the wrong hands is undesirable for obvious reasons, and the ability to remotely wipe the device in the event of it being misplaced is another strong reason as to why mobile security is so important in today’s world.

What to do?

When looking for a mobile security solution to protect devices such as smartphones and tablets from malware and to ensure personal information does not fall into the wrong hands, there are several features to look out for, which take care of security in the event of loss or theft and also help to prevent malware attacks from causing problems on the device and prevents cross-infection of other devices.

Remote locking capability is one crucial feature, which lets you remotely disable a lost or stolen phone to prevent strangers from accessing private information.  It also prevents thieves from actually using the device, so that they cannot run up large phone bills at your expense. This, combined with SIM card locking capability, which instantly locks your phone if its SIM card is removed so thieves cannot use it with a different SIM card, ensure that even if your phone is stolen, the thieves will not profit from it as the device is effectively rendered unusable.

Remote wipe is also critical, as this lets you actually erase all of the information contained on your phone if it is lost or stolen, including contacts, text messages, call history, browser history, bookmarks, and any data on the phone’s memory card. Mobile threat protection will detect and remove malware such as viruses and other threats without affecting phone performance, and download threat protection will automatically scan all files and app updates for threats.

Aside from these now vital security components, a comprehensive mobile security solution also lets you block calls and text messages from specific phone numbers, perfect for getting rid of annoying spam SMS’s and unwanted callers.

Mobile devices are increasingly common, which makes them more and more vulnerable to attack. Protecting all of the personal information stored on your mobile device is of the utmost importance to prevent all too common issues such as identity theft, and mobile security is no longer a nice to have, but a necessity for both consumer and business users in the modern world. 



Share the News

Get Daily Newsletter

Search News

comments powered by Disqus

MORE COMPUTING NEWS

Rack Centre appoints Udoaka Business Development Director

Rack Centre has announced the appointment of Mr Frederick Udoaka as its new Business Development Director.  Read More

Mellanox introduces new BlueField family of system-on-chip programmable processors

Mellanox Technologies, a leading supplier of high performance cloud and storage networking solutions, has announced the local availability of the BlueField family of programmable processors for networking and storage applications.  Read More

Police MfB, Intel, Airtel partner on computers for SMEs

The Nigerian Police Force Microfinance Bank (NPF MfB) has entered into a strategic partnership with Airtel and Intel to provide affordable and accessible technological devices for the Nigerian police force and SMEs in Nigeria. Read More

Transceiver warrantees: ProLabs separates fact from fiction

Value-added distributer, Networks Unlimited distributes ProLabs’ product line of high-quality, OEM-compatible optical transceivers and direct-attach cables offering at significant cost savings, often up to 70 percent less than OEM branded products, across the African continent.  Read More

Resolving the data centre disconnect

The disconnect between virtualised applications and physical storage is costing businesses time and money.    Read More

Huawei’s Botswana footprint ‘commendable’: MD

Gao Wenli, Managing Director of Huawei Botswana, is upbeat about the progress his company has made in the country so far.  Read More

Huawei stages inaugural ICT conference in Botswana

Huawei Technologies Botswana held its inaugural ICT conference where a lot of its cutting edge technology was on display.  Read More

Huawei initiates e-learning in Ugandan schools

In a bid to deepen ICT adoption among Ugandans, Huawei Uganda has provided internet connected computers to schools in western Uganda. Read More

F5’s latest plugins create compelling argument to move to OpenStack

OpenStack has emerged as one of the most popular cloud computing platforms, allowing organisations to easily build and scale next-generation applications in an open source environment.  Read More

Dealing with the dark side of rapid digitisation in financial services

Mobile payments and digital banking is evolving at breakneck speed across Africa, raising new digital security risks.  Read More

PRESS OFFICES

Sage EnterpriseSAP AfricaTrust PayVMWareSamsung ElectronicsMitsumi DistributionPhoenix DistributionMTN BusinessSchneider ElectricMultichoiceMicrosoft 4AfrikaNetworks UnlimitedArbor NetworksEricssonTigo Ghana

FEATURED STORY

Government should encourage youths in ICT earlyGovernment should encourage youths in ICT early

Youths should be given more encouragement to develop their ICT skills, an 11-year-old app developer told Kokumo Goodie.

IN DEPTH

IBM Opens First Cloud Data Centre in South AfricaIBM Opens First Cloud Data Centre in South Africa

IBM is opening a new IBM Cloud Data Centre in Johannesburg, South Africa. The new cloud center is the result of a close collaboration with Gijima and Vodacom and is designed to support cloud adoption and customer demand across the continent.  

COMPANY NEWS

Tigo, JI and GES equip teachers on child online protection initiative

Tigo, in partnership with J Initiative (JI), a youth focused non-governmental organisation in Ghana, have committed to protecting children online through policy advocacy, awareness creation, public education ...