User Behavior Creates the Biggest Mobile Security Risks

You can’t abolish your biggest mobile security risk, because it’s the people who use the mobile devices. Human nature can cause many problems:

Too trusting
People fall for flattery, people fall for requests for help, people fall for claimed social connections, people fall for all kinds of insincere requests, including phishing messages. This behavior isn’t limited to mobile devices, but the social nature of the devices combined with small screens make it harder to check out the bonafides of messages. As a result, users are more likely to respond to phishing messages and accidentally reveal account ids, passwords, and other sensitive data.

Too scatterbrained
Desktop PCs stay on the desk. Mobile devices travel with their owners, until they don’t: careless or rushed travelers can easily leave mobile devices behind in the cab, restaurant, or wherever they were being used. Once the mobile device is lost, all of the data stored on it is at risk.

Too lazy
Safe computing requires using strong passwords and staying up to date with operating system versions. Human nature means we prefer short passwords and don’t always bother applying patches. Both behaviors can expose mobile devices to risks.

Too penny-pinching
Mobile devices can be expensive, so employees may prefer to keep using older models with known security vulnerabilities instead of upgrading to the latest secure model. They may prefer to use free, insecure Wi-Fi, instead of spending for cellular data.

Too quirky
The point of mobile computing is to let employees use their own devices, tailored to their preferences. That means the devices may be filled with unsafe apps, or may be jailbroken, defeating many of the built-in security mechanisms.

Too unprofessional
Mobile phones aren’t professional devices, not entirely. Employees mix the personal with professional—that’s the point of allowing BYOD. But it also means employees may not maintain professional standards of conduct on their phones at all times, and more casual consumer attitudes towards security may at times mean treating business security on mobile devices casually, too.

Find more : 3 domains of information security

Comments

Popular posts from this blog

Performance evaluation for proactive network management

How to Invert Colors on Microsoft Office Picture Manager

The biggest ransomware threats