Mobile Device Security

MOBILE DEVICE SECURITY 5

There are numerous emerging security threats that have beenpresented in the Sophos report. There are many malware that areextremely difficult to detect and they are posing a huge threat tocompany’s data. Malware authors have managed to camouflage theirattacks and hence it is becoming extremely difficult to detect themalware (Sophos, 2014). Ransomware attacks are an emerging securitythreat where online marketing is being used as the platform forattacks. Cryptolocker is a key malware that is being using today forattacks.

Emerging technologies such as the ones interconnecting mobiledevices are posing systems that are prone to attacks. The mobileapplications, social networks and the interconnection of gadgets andother devices is a serious threat to security of data and the privacyof the owners of the devices. Botnets and exploit kits have evolvedover the last year to adapt to the advanced technology and to avoidsurveillance. Attacks on mobile devices and android based systems arealso an emerging security threat that has been highlighted in thereport (Sophos, 2014). Another emerging threat is the attacks onfinancial and transaction data which is spreading across the world.Additionally, the report highlights the return of the pump-and-dumpemail stock scams. However, it is worth noting that these scams werewiped out of existence in America a few years ago but have resurfacedas emerging threats.

There are a number of threats to mobile devices that are posing hugesecurity threats to the users and to the organizations. Firstly,there are android based botnets which attack mobile devices andinstruct them to send premium short messages to particular contacts.These botnets attack the mobile devices the same way they affect thepersonal computers. It is evident that the botnets can prompt themobile devices to send company emails to particular contacts hencecompromising the security of the company data. Another major securitythreat to the mobile device is the Ransomware attacks which appear asantiviruses (Sophos, 2014). The recent Ransomware is the defenderwhich disables a mobile device’s functions and demands a payment ofa certain amount to reactivate the mobile device. It is, however,worth noting that the app does not affect the personal data of themobile device user.

Mobile devices are currently being infected with malware and thehackers are using the infected mobile devices to access other devicessuch as computers for the company. This poses a huge threat to thecompany’s information and sensitive data. An example is a mobiledeice that has been infected with Smartphone-Pentest-Framework, orSPF&nbspand the user connects it with a laptop through Wi-Fi(Sophos, 2014). The laptop may contain sensitive company data andtherefore the hackers will have access to such data.

Organizations have a responsibility of ensuring that the threats onthe mobile devices do not affect their data. It is evident that todaynumerous employees are working on the go and they are using theirmobile devices for emailing, texting or sharing transmittingsensitive organizational data from one device to another. One aspectthat is consistent is that most of the mobile devices being attackedare android based. It is the responsibility of the organization toensure that their computers are not connected to the mobile devicesto ensure that their data is safe. Google has also taken varioussteps towards securing their android system over the years. It isessential for the organization to train the employees on detectingsuspicious apps such as the Ransomware which are camouflaged as anantivirus. This training will go a long way in ensuring that themobile devices are safe and therefore the organization’s data issafe.

It is clear from the articles that the mobile threats are mostcritical threats in many organizations today. Majority of the ITprofessionals who were interviewed agreed that the mobile devices arejoining the network and that they are constantly being targeted bymalware. The mobile devices are easily attacked and therefore theycontinue to pose one of the greatest challenges. The mobile devicesare becoming even more of a threat because of the advanced persistentthreats which are also now targeting the mobile devices in thenetworks. Other threats such as the ATPs and malware are alsosignificant threats that cannot be ignored (Sophos, 2014). Whereasthe mobile device security seems to be the biggest security threattoday, it is essential to note that it is an emerging trend.

Spyware threats are huge and serious security threat which warrantsconcern for organizations. Spyware are applications and programswhich are installed into a user’s computer without the knowledge ofthe user. They are mostly threats which target online activities. Thehidden applications and programs capture vital information from theuser’s computers. These are very dangerous threats since theycannot be detected by the user and they compromise the integrity ofthe organization’s data. There are numerous software and antivirusthat can be used to remove spyware from one’s computer. It isessential to consult an IT specialist on the best software to use toremove spyware. It is essential to be on the look out to detectspyware such as when a system is extremely slow or the search engineis changed without the consent of the user.

Reference

Sophos. (2014). Security Threat Report. Retrieved on 25thNovember 2015 from: http://www.sophos.com/en-us/medialibrary/PDFs/other/sophos-security-threat-report- 2014.pdf.