Mobile SecurityA developing technology The use of mobile phones to connect to the Web is over twenty years old, just a year older than the Web itself, but the danger of threats to one’s identity and personal computer files from online by viruses and malware have only recently begun to be understood, and similar threats to smartphones, many of which are unique to those devices, have been realized by the average citizen even more recently.

The companies that have long been producing protective software for PCs (Avast, McAfee, Norton and so forth) realize the dangers, however, and in consequence they have expanded their services to include the same kind of protection for the mobile phone. The typical security package includes such features as:

  • remote lock: renders a lost or stolen phone unusable until a password is entered
  • remote wipe: erases the data stored on the phone so no one can access it. Both these functions can be carried out through a PC.
  • scream alert: issues an audible sound when the phone is lost or stolen
  • GPS location: for tracking down a lost phone
  • taking photographs of unauthorized users

All these are great things to have, but there many limitations in mobile security remain to be overcome. Outlined below are three things that could be implemented in mobile security solutions of the future.

1) Create more multitask systems.

Only a minority of smartphone systems are single-task, but many of them are still widely used. The disadvantage that such systems present is that they are inherently insecure. This is because, as their name indicates, they can handle only one task at a time, with nothing running in the background. As a result, they cannot run protection systems while the owner is using the phone, which is precisely the time when threats are most likely to be introduced. Phone users in general should do the necessary research so as to become more aware of this weakness of single-task smartphone systems.

2) Create security programs that are more energy autonomous than the ones that we have now.

One of the areas of greatest concern for today’s mobile security software is that it consumes too much battery power. There should be more “energy autonomous” security solutions that will not drain the phone’s energy resources undermine the use of thereof. Similarly, these solutions should not make too much use of the network since this is the most expensive mobile resources. If possible, remote servers should take over certain calculations.

3) Improvements in cloud security

Cloud computing and mobile phone computing have begun to go hand in hand over the past decade and to parallel each other’s development. Therefore, many of the new ideas that could be applied to one may work just as well with the other. Businesses, especially big ones, are storing their files in the cloud so that employees can share them on both computers and cellphones. Already a system is in place called Secure Cloud whose function is to prevent parties from viewing each other’s account information. Mobile wallets may be developed that will use tokens rather than card numbers when making purchases.

It should be realized that not all improvements are possible in the area of mobile security. Some things simply have to be dealt with, such as the more limited range of technical resources available on a smartphone; nor are all the limitations of mobile devices due to computing power, though this is becoming faster.

Another important point is that mobile users need to be aware of what updates are available for development or deployment. Phone attackers often take advantage of the fact that the very users of their target phones do not know that there a newer version of the operating system exists and is compatible with the devices. Likewise, they often discover vulnerabilities that the owners did not know about which they can exploit. This problem can be taken care of only by the willingness of phone users to keep on top of things, not by new developments in security technology.

Sarah Hendricks who is a security expert on protecting users and businesses from hackers and data leakage with quality mobile antivirus software. Users in the office, at home, or working remotely are all subject to attack, visit the NQ Mobile mobile security company to learn where to find mobile security applications.

Advertisements