The enormous capabilities of smartphones, tablets, wearables, etc. are definitely “super” but are they secure? I think you can guess the answer to that question.
If you thought your mobile devices were safe, you might want to take a second look at what could be lurking under the covers.
How super are our phones and related mobile devices? Take a look at the cool infographic below and it’s easy to see how for granted we take these incredible devices. It’s also easy to see why they are such a tempting cybersecurity targets and why they have forever changed the landscape of personal computing.
Back to Security. As you’ve probably guessed, these devices come with a whole host of serious security and privacy concerns that are frequently discussed in the popular media. Here are just a few worrying facts from Symantec’s 2015 Internet Security Threat Report that are worth repeating:
- Symantec found that 17 percent of all Android apps (nearly one million total) were actually malware in disguise.
- Grayware apps, which aren’t malicious by design but do annoying and inadvertently harmful things like track user behaviour, accounted for 36 percent of all mobile apps.
- Of the 6.3 million mobile apps analyzed in 2014, one million of these were classified as malware, while 2.3 million were classified as grayware.
Cyber security is a complex and rapidly evolving area of technology. But one thing is clear, better solutions are desperately needed. At BluStor, believe the elimination of traditional usernames, passwords, and pins is a critical requirement in the war against cyber crime. Separating the keys of your identity from these devices is essential. The solution is multi-factor biometrics and we are leading the charge with the industry leading technology found in our CyberGate platform.
If you valued this article and want more, please hit the ‘like’ button and also share via your Twitter, LinkedIn, Google+ and Facebook social media platforms. I encourage you to join the conversation or ask questions so feel free to add a comment on this post.
You can also find me on twitter at @NewFrontierCIO for more commentary on the frontiers of technology, leadership, space exploration, and science.