|
|
|
Mobile Security Risk Protection by Maria Antoinette Del Castillo
|
|
|
Mobile Security Risk Protection |
|
|
|
Science & Technology
|
|
From calling, texting, and even sending emails, mobile phones had truly come a very long way, particularly now that mobile phones can now also be used to access the internet as well as use a number of applications or APPs. However, as mobile technology grows so as its security risks. “Owning to their portability and advanced computing features, smartphones are becoming popular to both consumers and cybercriminals,” warned Mitchel Chang, SVP for Global Technical Support of global cloud security leader Trend Micro Inc. According to Chan, who is also the site executive of TrendLabs Philippines, (Trend Micro’s multinational research, development, and support center), the first half of the year alone, his company noted a 14-fold increase of malware targeting Android-powered mobile phones and devices. Other than Android Other than Android, Chan had also warned about Malware attacks on other OS’ such as iOS, Symbian, Blackberry OS, as well as Windows Phone 7. “As smartphones continue to become more sophisticated and more integral to our everyday work and personal lives, these mini-computers will become an even more enticing target of security threats,” said Chang. According to Technology Philippines news, he added that the best way for them to secure their privacy using their mobile phones is by adding security software which had become a practice when using their desktop and laptop devices. Mobile Security Protection However, as cybercriminals continuously tries to do harm to mobile phone consumers, security providers had also kept its pace to keep-up with the security of their consumers. “These cybercriminals may have the tools they need to effectively turn mobile malware into the biggest customer security problem. However, we are also committed to enhancing the protection that our products could provide, proactively defend our customers’ online experience, as well as securing all aspects of their digital lifestyle,” said Chang. A Popular example is Trend Micro itself, which had gone to lengths in giving security to mobile phones. This is by developing integrated mobile device management and security solution that works within a security framework that spans physical and virtual, PC and non-PC devices. According to Philippines Lifestyle news, this solution provides organizations a single point of visibility and control for device management and security. In addition to that, it also protects data as well as limits the loss data. Considering the rising mobile phone risks, Chang said there are some other steps that one could also take: “Never download apps if you are not sure of the site in order to prevent getting infected with malware. If your smartphone has security features, use it; if there’s none; install security software offered by prestigious security provider.”
Related Articles -
Technology Philippines, Philippines Lifestyle,
|
Rate This Article |
|
|
|
Do you Agree or Disagree? Have a Comment? POST IT!
Reader Opinions |
|
|
|
|
|
|
|
|
Author Login |
|
|
Advertiser Login
ADVERTISE HERE NOW!
Limited Time $60 Offer!
90 Days-1.5 Million Views
|
|
TIM FAY
After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
|
|
|
|
|
GENE MYERS
Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
|
|
|
|
|
LAURA JEEVES
At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
|
|
|
|
|
ADRIAN JOELE
I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
|
|
|
|
|
DONNIE LEWIS
I'm an avid consumer of a smoothie a day living, herbs, vitamins and daily dose of exercise. I'm 60...more
|
|
|
|
|
SUSAN FRIESEN
Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
|
|
|
|
|
STEPHEN BYE
Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
|
|
|
|
|
STEVE BURGESS
Steve Burgess is a freelance technology writer, a practicing computer forensics specialist as the pr...more
|
|
|
|
|
ALEX BELSEY
I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
|
|
|
|