Mobile Security Essay

Superior Essays
There are many concerns that can impact a work environment affecting the company, employees, and customers that are faced every day. The damaging implications can arise from security concerns that could lead to theft, identity theft, fraud, and much more. The concerns that may arise when determining the proper security measure to insure in a company can only be beneficial when protecting the company before damage is done.
As businesses incorporate a BYOD strategic plan, mobile security becomes even more important. With the power and technological advances of tablets and phones more companies are recognizing their potential to provide a better, faster, and easier work environment. However, as the popularity grows with these devices so does the attempts to hack them. Mobile security is just as important as network security and knowing how to secure a device and threats to look out for can be beneficial to both an employee and a business. Mobile devices are vulnerable to attacks just like a computer. A common attack is malware. Malware, short for malicious software, is software that is designed to damage or do
…show more content…
A phishing scam is a form of social engineering where an attacker tries to gain information for malicious use, usually through email. Smishing is when an attacker will use SMS messaging instead of emails. Smishing scams have been on the rise and are becoming a great risk to users and business. In July 22nd and 27th 2016, Intel found two large scale smishing campaigns targeting apple users. They sent out an SMS message that appeared to come from apple asking them to verify their passwords (Amir, U. 2016, July 31). These types of scams can be used to steal personal information, financial information, or passwords. This can lead to data breaches or identity theft. A company must be vigilant on keeping their employees informed on the new scams and how to spot a fake email, link, and text

Related Documents

  • Decent Essays

    Working alone, I immersed myself in this environment and worked toward removing inefficiencies, security oversights, and business continuity issues. As I hope you’ll see, the high-security, HIPAA-compliant environments that I’ve worked in have exposed me to policies, products, and procedures that I can bring to your organization to help strengthen your information security program. Additionally, my expertise in securing iOS and Android mobile devices means that I can help mitigate threats to this increasingly significant portion of your computing…

    • 320 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Malware Attacks Affecting Hospital Information Systems Technology has made many facets of everyday life considerably easier in many ways. With that convenience, comes opportunity for many criminals. Almost every electronic device is susceptible to compromise, however hospitals represent a valuable resource to criminals due to the sensitive nature of the information contained within them. This report will evaluate the types of malware attacks that directly affect hospital information systems, potential ways that attackers can gain access to perform these threats, and ways to protect against these threats. Malware Attacks Affecting Hospital IT Systems Types of malware include Trojans, viruses, worms, bots, spyware, and rootkits.…

    • 825 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Iphone Hack Thesis

    • 364 Words
    • 2 Pages

    The Truth About The iPhone Hack The tech giant Apple refused to disclose the security encryption key for the cell phone of the San Bernardino terrorist. The result was a court order filed against Apple by the Federal Bureau of Investigation. Apples refusal to cooperate with the FBI was based on a controversial principle regarding the personal security of an estimated 100-million iPhone users around the world. The court order was lifted when a professional hacker stepped forward and broke the code on behalf of the Feds.…

    • 364 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Phishing is one of the assaults that have become famous these days. it's far an identity robbery try with the intention to obtain exclusive and private data of people or companies for monetary or other profits. inside the latest component there had been many reports on phishing assault in lots of financial domains such as banking. It has emerge as a severe threat to establishments that deal with monetary transactions. If those threats aren't addressed thoroughly, people can’t trust on-line transactions that contain due authentication through credentials.…

    • 205 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Phishing is a way to try and get private information from unsuspected individuals. Frauds try to get passwords of email accounts and bank information. With the use of fake websites or other smart tricks. With the information obtained the frauds can steal your money or identity (phishing, 2016)…

    • 370 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cell phones, we all have them. However, are cell phones a necessity in our everyday lives. Many may conclude that mobile devices are a necessity in order to exist in our ever evolving landscape. Personally, I am unable to function without my mobile device(s), due to my everyday tasks. Many others fall within this parameter, in order to accomplish certain requirements of their jobs and personal lives.…

    • 468 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Background: Recently, Apple was required to unlock a work-issued iPhone-5C to cooperate with FBI in a terrorist attack. However, Apple declined the request. Apple’s attitude on encryption: Law enforcement agents around the country have already said they have hundreds of iPhones they want Apple to unlock if the FBI wins this case. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks. Of course, Apple would do our best to protect that key, but in a world where all of our data is under constant threat, it would be relentlessly attacked by hackers and cybercriminals.…

    • 947 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Introduction of the Canadian Mobile Industry Nowadays, mobiles become the necessity of peoples’ daily life. People keep their cell phone with them wherever they go and whatever they are doing. People communicate with each other on phone with SMS, mobile applications or through social media platforms when they are on the go.…

    • 532 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In current events, the United States government has demanded that Apple decrypt the iPhone of Syed Rizwan Farook, a shooter involved in the San Bernardino attacks. On the surface, this mandate seems harmless; after all, the government simply wants to access Farook’s phone in hopes of preventing similar, future attacks. However, reality proves far more ambiguous and has become a quagmire; there is certainly more going on here than meets the eye. These bizarre turn of events can potentially be pernicious to the American public’s freedom and security in general, and these same circumstances—if not diagnosed and redressed now—may have irrevocable consequences.…

    • 1281 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    University of Phoenix Material Communication Process Complete the following table. • Review the steps of the communication model on in Ch. 1 of Business Communication. (See Figure 1.3). • Identify one personal or business communication scenario.…

    • 815 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Waiting is so unusual that many of us can 't stand in a queue for 30 seconds without getting out our phones to check for messages or to Google something. As a result, phones are the new generation. Phones present multiple tasks. Even though smart phones can be dangerous by causing accidents, affecting people’s health, and affecting people’s safety, smart phones are high in demand because they a main key to communication and two-thirds Americans use a smart phone.…

    • 775 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The advancement of technology brings about an environment that is prone to attacks and propels companies to identify the best tools to secure their assets. Specifically as cybersecurity is evolving and it is becoming more valuable to organizations to understand how it could affect them. Although there is a wide assortment of security tools, products and services to invest in, it is still difficult to identify the most beneficial security measures for a firm because security is dynamic. The article illustrates a multifaceted perspective to explain the major security trends of 2014. It specifically describes how the past will impact the future and the relationship between business and technology.…

    • 920 Words
    • 4 Pages
    Improved Essays