Is This The End Of The Evolution For Mobile Device Security And Privacy?

No Comment Yet

When transitioning from one technology to another, the battle no longer has to do with just performance or ease of use, especially when it comes to Mobile Devices or Smartphones for Business. Today’s business users need a mobile phone with an access to top-notch security features and applications. It seems everyone is concerned about protecting their privacy and security on mobile devices.

As more and more device features are introduced, you may be subjected to varied forms of technology abuse. The bigger question is: How are platforms keeping up in terms of mobile security?

You may not be equipped to address all of the implications of platform changes but keeping a healthy gauge of security can protect you, especially since cybercriminals will continue to prey on the unaware.

Top 10 Countries at Risk of Malicious App Downloads
1. Pakistan
2. Argentina
3. Myanmar
4. Mexico
5. Ukraine
6. Vietnam
7. Qatar
8. Saudi Arabia
9. Lebanon
10. Romania

Top 10 Countries at Risk of Privacy Exposure
1. Serbia
2. Morocco
3. Mexico
4. Ukraine
5. Saudi Arabia
6. Philippines
7. Russia
8. South Africa
9. Switzerland
10. Brazil

Blackberry z10 and MacBook Air

Blackberry z10 and MacBook Air

Top 10 recommendations for mobile security:

1. Add mobile security to existing employee security awareness programs.
2. Create and implement an IT policy that governs usage and ensures employees’ understanding.
3. Perform threat modeling to identify the risks of moving applications to a mobile platform.
4. Train application developers in secure coding practices for mobile device platforms.
5. Limit the sensitive data transferred to mobile devices, or consider view-only access.
6.Utilize Mobile Device Management software to create an encrypted password-protected sandbox for sensitive data and enforce device-side technical policies.
7.Perform technical security assessments on mobile devices and the supporting infrastructure — focus on device-side data storage.
8.Establish a program that continually evaluates new and emerging threats in mobile platforms.
9.Increase monitoring controls around mobile device connection points when feasible.
10. Assess classic threats against web-based applications and infrastructure.

Let’s take a look at how mobile device security has evolved:

1) Sharp Dial Master EL-6250H (1989) : – Security feature: Secret key to password-protect items.

Sharp Dial Master EL-6250H

Sharp Dial Master EL-6250H

2) RIM Inter@active Pager 950 (1997)  :- Security features: Just password protection.

RIM Inter@active Pager 950

RIM Inter@active Pager 950

3) HP 6601x (1999) :- Security features: Password protection similar to that of a PC. Lost your password? Hard reset required — and all data was lost.
HP-6601
4) Compaq iPAQ Pocket PC (2000) : – Security features: Standard Windows password protection. iPAQ Backup saved data to an external device, compressed or encrypted.

Compaq iPAQ Pocket PC

Compaq iPAQ Pocket PC

5) Sony Clie PEG-NX70V/U (2002) :- Security features: Data backup to PC, personal information protection and the ability to mask certain data with password protection.

Sony Clie PEG-NX70V

Sony Clie PEG-NX70V

6) BlackBerry 7100 t (2004) :- Security features: Password protection, device-locking capability, content protection and compression, et cetera.

BlackBerry 7100 t

BlackBerry 7100 t

7) Blackberry Curve and the iPhone (2009)

Blackberry Curve and the iPhone

Blackberry Curve and the iPhone

8) iPad, iPhone, Blackberry, MacBook Air (2013) :- Security features: Among the many features, all the devices feature password protection and the ability to be able to wipe remotely. The owner can also locate them if they are lost (provided you have downloaded the proper applications in advance).

iPad and iPhone

iPad and iPhone


Is this the end of the evolution for mobile device security? We think not!

Please share your thoughts in the comment box below!!!

All views and opinions expressed are those of the original authors, columnists and other contributors and not necessarily those of the CEOWORLD Magazine. The CEOWORLD Magazine is an independent and neutral platform focused primarily on facilitating and improving dialogue around the key issues and challenges encountered by business leaders, CEOs, CFOs, CIOs, CMOs, CTOs , and other forward-thinking high-level executives around the world. The CEOWORLD Magazine is not responsible for and does not control the content of linked Third Party Sites. Whilst we hope that you will find the third party sites linked to of interest, we can accept no responsibility in respect of any third party web sites or any information contained therein. The inclusion of any link does not imply CEOWORLD Magazine endorsement of the site, entity, products or services. Due to the volume of submissions received, we cannot guarantee publication, however you are invited to express your opinion in the comment section below. To submit a article or column, contact us | info@ceoworld.biz.

Follow The CEOWORLD Magazine on Twitter >>> @ceoworld
Like The CEOWORLD Magazine on Facebook >>> ceomagazine
Post A Job Listing For Free‎ >>> CEOWORLD Magazine Jobs

Amarendra Bhushan

Amarendra Bhushan

CEO and Editorial Director at CEOWORLD Magazine
Amarendra is the Chief Executive Officer and Editorial Director at CEOWORLD Magazine, and is responsible for all business management, company operations, finance, and social advertising operations.
Email- amar@ceoworld.biz
Amarendra Bhushan
Amarendra Bhushan

Author

Amarendra Bhushan

Amarendra is the Chief Executive Officer and Editorial Director at CEOWORLD Magazine, and is responsible for all business management, company operations, finance, and social advertising operations. Email- amar@ceoworld.biz

Up Next

Related Posts

Leave a Reply

Be the First to Comment!