Mobile Security
Mobile Device Threats
Poor Password Hygiene
A study by Google revealed that half of Americans use similar passwords for multiple accounts (Platsis, 2020). This problematic approach can turn more catastrophic in devices containing both personal and company account sign-ins.
Sharing a password with coworkers increases the vulnerability of being attacked by internal and external intruders. Unfortunately, most employee prefers simple and memorable passwords, increasing their exposure to external attacks.
Insecure WIFI
Most people are not ready to use their cellular data while free wireless hotspots exist. Most of the public WIFIs are insecure and can potentially subject the user to immeasurable dangers.
The public WIFIs are operated by technology experts who can readily maneuver them to suit their intended purpose (Raphael, 2021).
Ideal Mobile Security Settings
- Use a strong passcode for your device – Strong passwords should be applied to lock the device and all accounts.
- Keep your software updated – Unfortunately, only 20% of Android users use the currently released versions (Wang, Hahn & Sutrave, 2016). As such, the majority of mobile phones can easily be subdued by minor security attacks.
- Install firewalls – Vast devices come with fewer security measures; thus, it remains upon the user to institute additional measures.
- Download apps from legit app stores – The public WIFI might be engineered to mislead one into the wrong destinations maliciously.
- Don’t root your phone – Jailbreaking the mobile involves removing safety features, making it easy to hack.
Instructions for Setting up Security Settings
Poor Password Hygiene
- Understand the current state of password security in the modern world.
- Scroll to the specific accounts under security threat.
- Maneuver to the security settings option.
- Select change password.
- Replace the current password with a stronger code.
- Mix letters, characters, and numbers in the newly developed passcode.
- Repeat the process for other accounts, but use different passwords.
- Embrace password manager (Bendale & Prasad, 2018).
Insecure WIFI
- Use free WIFI sparingly.
- Use VPNs to access public WIFI.
- Ensure that your firewall is consistent with the device.
- Unable to auto-connection to the available networks (Raphael, 2021).
Consequences of not Securing the Threats
- The devices can easily be hacked-– The intruders can easily attack people who use public WIFI to access their confidential information. There have been several cases of trespassing on social media accounts, VoIP conversations, and PayPal, among other platforms (Platsis, 2020).
- Social engineering – Poor security measures make it more convenient for fraudsters to manipulate the target population for their gain.
- Data leakage – Weak passcodes and insecure WIFI are effective avenues of exposing personal and company data. Data confidentiality is priceless, and its exposure to the public can hinder a company’s functionality.
- Risk of being spied on – Once attackers access one’s device, they can monitor all events and launch other malicious programs.
References
Bendale, S. P., & Prasad, J. R. (2018, November). Security threats and challenges in the future
Mobile wireless networks. In 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN) (pp. 146-150). IEEE.
Platsis, (2020). The Latest Mobile Security Threats and How to Prevent Them. Security
Intelligence. Retrieved from: https://securityintelligence.com/articles/the-latest-mobile-security-threats-and-how-to-prevent-them/
Raphael (2021). 8 Mobile Security Threats You Should Take Seriously. Retrieved from: https://www.csoonline.com/article/3241727/8-mobile-security-threats-you-should-take-seriously.html
Wang, Y., Hahn, C., & Sutrave, K. (2016, February). Mobile payment security, threats, and Challenges. In 2016 second international conference on mobile and secure services (MobiSecServ) (pp. 1-5). IEEE.
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
Mobile Security
Mobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices and safety precautions. This poster will be seen by the entire company in hopes of empowering employees to protect themselves and the company from mobile breaches.
Create a visual poster or infographic to display in the company’s break room. Include the following information:
- At least 2 mobile device threats
- List of ideal mobile security settings to defend against threats
- Brief instructions for setting up at least 2 security settings
- An explanation on what happens when mobile devices are not secured from these threats
- Appropriate images and graphics
- 2 resources for more information on mobile security with appropriate citations
Format your assignment according to APA guidelines.