This week, the mobile enterprise addresses security threats that pose the biggest threats to mobile users.
A Mobile Solution for Wire-Tapping
In this day and age of advanced cyber security risks, it’s important to remember that good ol’ fashioned wire-tapping is still a potential threat for mobile users. But, thanks to Giesecke & Devrient (G&D), which introduced a new microSD card, users can prevent cell phone tapping. The Mobile Security Card Voice Edition (VE) 2.0 contains a cryptocontroller that encrypts cell phone conversations and securely authenticates the user. The card, designed for companies who carry a high risk of cell phone conversations being tapped into, fits into the microSD slot in cell phones and smart phones.
By using two-factor authentication, both the card and PIN are needed to confirm a user’s identity. As well, G&D employs a longer than usual encryption algorithm key that is making it much harder to decipher. With 2 GB memory, the Mobile Security Card VE 2.0 is supported by the Windows Mobile, Blackberry, Symbian, Android and Linux mobile operating system platforms.
Don't Lose Your Identity
Have you be smished lately? What about vished? No, these aren’t games, but new terms the FBI is using to classify mobile phone threat variations of phishing. Smishing uses SMS texts to initiate the scam, while vishing uses automated phone calls.
Methods for identity theft are ever-evolving, ordinarily we’d proceed as usual, but because many mobile users are novices in regard to computer security threats, many are simply unaware that they are at risk when they respond to text and audio phishing on their mobiles.
Smishing attempts can take the form of text messages and voice messages, which come to your phone displaying messages like "We’re confirming you've parcel delivery”, “Your account status as been changed or ABC credit card is confirming your purchase." Unaware users may be given a phone number to call or a website to log onto to provide account credentials to remedy the issue. The user may also be directed to a spoofed website, designed to mislead a user into providing personal information, which is in turn routed to the scammer's computer.
So what can you do to protect yourself? The FBI recommends the following:
- Do not respond to text messages or automated voice messages from unknown or blocked numbers.
- Do not respond to unsolicited (spam) email.
- Do not click on links contained within an unsolicited email.
- Only open attachments from known senders. Avoid filling out forms contained in email messages that ask for personal information.
- Contact the actual business that supposedly sent the email to verify if the email is genuine.
- Verify any requests for personal information from any business or financial institution by contacting them using the main contact information.
Finally, if you suspect that you’ve been the victim of any cyber crime, it’s recommended that you file a complaint via the FBI’s Internet Crime Complaint Center (IC3).
- Is Box Writing Enterprise Content Management's Obituary?
- Customer Journeys Trump the Traditional Sales Cycle
- The Future of SharePoint is the Cloud #gartnerpcc
- Gartner Names Wise Choices for Workplace Social Software
- Microsoft Leaves Ballmer Bleeding as It Moves On
- 12 Steps To A Successful ECM Deployment #gartnerpcc
- Are You a Top 20 Document Management Vendor? [Infographic]