CEOWORLD magazine

5th Avenue, New York, NY 10001, United States
Phone: +1 3479835101
Email: info@ceoworld.biz
CEOWORLD magazine - Latest - CEO Agenda - Is This The End Of The Evolution For Mobile Device Security And Privacy?

CEO Agenda

Is This The End Of The Evolution For Mobile Device Security And Privacy?

Blackberry Curve and the iPhone
Blackberry Curve and the iPhone

When transitioning from one technology to another, the battle no longer has to do with just performance or ease of use, especially when it comes to Mobile Devices or Smartphones for Business. Today’s business users need a mobile phone with an access to top-notch security features and applications. It seems everyone is concerned about protecting their privacy and security on mobile devices.

As more and more device features are introduced, you may be subjected to varied forms of technology abuse. The bigger question is: How are platforms keeping up in terms of mobile security?

You may not be equipped to address all of the implications of platform changes but keeping a healthy gauge of security can protect you, especially since cybercriminals will continue to prey on the unaware.

Top 10 Countries at Risk of Malicious App Downloads
1. Pakistan
2. Argentina
3. Myanmar
4. Mexico
5. Ukraine
6. Vietnam
7. Qatar
8. Saudi Arabia
9. Lebanon
10. Romania

Top 10 Countries at Risk of Privacy Exposure
1. Serbia
2. Morocco
3. Mexico
4. Ukraine
5. Saudi Arabia
6. Philippines
7. Russia
8. South Africa
9. Switzerland
10. Brazil

Blackberry z10 and MacBook Air
Blackberry z10 and MacBook Air

Top 10 recommendations for mobile security:

1. Add mobile security to existing employee security awareness programs.
2. Create and implement an IT policy that governs usage and ensures employees’ understanding.
3. Perform threat modeling to identify the risks of moving applications to a mobile platform.
4. Train application developers in secure coding practices for mobile device platforms.
5. Limit the sensitive data transferred to mobile devices, or consider view-only access.
6.Utilize Mobile Device Management software to create an encrypted password-protected sandbox for sensitive data and enforce device-side technical policies.
7.Perform technical security assessments on mobile devices and the supporting infrastructure — focus on device-side data storage.
8.Establish a program that continually evaluates new and emerging threats in mobile platforms.
9.Increase monitoring controls around mobile device connection points when feasible.
10. Assess classic threats against web-based applications and infrastructure.

Let’s take a look at how mobile device security has evolved:

1) Sharp Dial Master EL-6250H (1989) : – Security feature: Secret key to password-protect items.

Sharp Dial Master EL-6250H
Sharp Dial Master EL-6250H

2) RIM Inter@active Pager 950 (1997)  :- Security features: Just password protection.

RIM Inter@active Pager 950
RIM Inter@active Pager 950

3) HP 6601x (1999) :- Security features: Password protection similar to that of a PC. Lost your password? Hard reset required — and all data was lost.
HP-6601
4) Compaq iPAQ Pocket PC (2000) : – Security features: Standard Windows password protection. iPAQ Backup saved data to an external device, compressed or encrypted.

Compaq iPAQ Pocket PC
Compaq iPAQ Pocket PC

5) Sony Clie PEG-NX70V/U (2002) :- Security features: Data backup to PC, personal information protection and the ability to mask certain data with password protection.

Sony Clie PEG-NX70V
Sony Clie PEG-NX70V

6) BlackBerry 7100 t (2004) :- Security features: Password protection, device-locking capability, content protection and compression, et cetera.

BlackBerry 7100 t
BlackBerry 7100 t

7) Blackberry Curve and the iPhone (2009)

Blackberry Curve and the iPhone
Blackberry Curve and the iPhone

8) iPad, iPhone, Blackberry, MacBook Air (2013) :- Security features: Among the many features, all the devices feature password protection and the ability to be able to wipe remotely. The owner can also locate them if they are lost (provided you have downloaded the proper applications in advance).

iPad and iPhone
iPad and iPhone


Is this the end of the evolution for mobile device security? We think not!

Please share your thoughts in the comment box below!!!


Add CEOWORLD magazine to your Google News feed.
Follow CEOWORLD magazine headlines on: Google News, LinkedIn, Twitter, and Facebook.
Copyright 2024 The CEOWORLD magazine. All rights reserved. This material (and any extract from it) must not be copied, redistributed or placed on any website, without CEOWORLD magazine' prior written consent. For media queries, please contact: info@ceoworld.biz
CEOWORLD magazine - Latest - CEO Agenda - Is This The End Of The Evolution For Mobile Device Security And Privacy?
Prof. Dr. Amarendra Bhushan Dhiraj
Prof. Dr. Amarendra Bhushan Dhiraj is a publishing executive and economist who is the CEO and editor-in-chief of The CEOWORLD magazine, one of the world’s most influential and recognized global news publications. Additionally, he serves as the chair of the advisory board for the CEOWORLD magazine. He received his Ph.D. in Finance and Banking from the European Global School, Paris, France. He earned his Doctoral Degree in Chartered Accountancy from the European International University Paris, France, and a Doctorate in Business Administration from Kyiv National University of Technologies and Design (KNUTD), Ukraine. Dr. Amarendra also holds a Master of Business Administration degree in International Relations and Affairs from the American University of Athens, Alabama, United States.


Prof. Dr. Amarendra Bhushan Dhiraj is CEO and editor-in-chief of CEOWORLD magazine. You can follow him on LinkedIn, Facebook, Twitter.