Security

How to overcome mobile computing security issues

protected

Nowadays most of the people are engaged in mobile computing. Because of the mass usage and important data being transferred, attackers and intruders are very enthusiastic of accessing mobile computing devices unauthorizedly. So, in mobile computing the vulnerability of being expose to attackers is high. Nobody needs to be vulnerable to the attackers. Nobody needs to give away their private and confidential information to the malicious users. So, it’s really important to maintain a good behavior in usage and follow appropriate security solutions. In my previous blog post (check this link if you are interested https://kumudika.wordpress.com/2017/04/28/vulnerabilities-and-threats-of-mobile-computing/) I have discussed some of the main vulnerabilities and threats of mobile computing. So, in here I’ll discuss about what we shall do as a preventing mechanism.

  • Use a proper anti-malware software or scanning tools and update it regularly
  • Use appropriate authentication methods
  • Encryption for data in transmission(SSL, SSH) and data at rest(database, drive)
  • Beware of vulnerabilities and security threats

virus

 

 

 

 

 

  • Use protections for confidentiality threats like shoulder surfing, social engineering, etc
  • Use licensed software and hardware
  • Conduct security checkups regularly
  • Identify vulnerabilities of the existing devices and make appropriate solutions
  • Enforcing proper access rights (authorization)
  • Use strong passwords and do not reveal credentials to unauthorized parties. Do not use personal data like name, birthday as your password or password hints which can be easily guess
  • Do not use same username, password, email for every account because if a hacker new your login credentials of one account, those credentials would be his first guess when he is involving in a Bruce force attack
  • If any website gives you the password back when you ask for the forget password option, do not use that site again. Because it doesn’t use encryption when storing passwords. So, the attackers can hack their database and steal your credentials

Find-your-lost-mobile

  • Lock your devices if your are leaving your device for a while
  • Logout after using personal accounts like social media account
  • Avoid storing sensitive data in the mobile devices (eg: ATM password)
  • Be careful in online transactions and submitting banking details via online
  • Use technologies like native remote lock and find and wipe capabilities in case of theft or loss devices
  • Organize email inbox and be careful about spam messages
  • Read policy statements before installing a software or any other mobile application
  • Maintain software and data backups
  • Double check when installing free mobile application
  • Surf only in secured websites

https

  • Be careful when clicking links on the websites. Before click, hover on the link and check what is the destination of that link
  • Control wireless network and service connectivity
  • Beware of storage capacity, speed of your own devices. Any irregular pattern might give you a sense of attack because some attackers use your device’s storage/ connection for their malicious purposes
  • Use only properly registered network connections and Access Points

network-security

  • Be careful when adding unknown persons into your social media accounts. Fake accounts and pages are one of the way that attackers use to steal your personal information
  • If you have recognized that you are under an attack, quickly inform that to the authorized/responsible parties

 

Advertisements

2 thoughts on “How to overcome mobile computing security issues

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s