Why mobile security is the most critical initiative today

Today our lives are inextricably tied to our mobile devices. We use them just like mini-computers, handling sensitive personal and work-related matters throughout the day. This trend is concerning because mobile devices were not designed with security in mind and are now arguably the biggest threat to both consumer and enterprise security.

Just like we have seen with the evolution of computer threats, cybercriminals are catching onto the new opportunities mobile presents. This past year, we have witnessed a dramatic spike in mobile-first cyberattacks like social media and SMS phishing, malicious apps and even robocalls. These attacks are also only going to increase with the bring your own device workplace.

Why mobile security is the most critical initiative today? Read on..

Advertisements

Reliance Jio data breached by website, company says it is ‘unauthentic’

A website has claimed to have posted subscriber data of Reliance Jio customers, including email IDs, names and Aadhaar numbers, on the website magicapk.com. While it couldn’t be confirmed whether the data related to all of Jio’s 120 million subscribers was uploaded, queries made through the website for some older numbers returned with information of all the fields.

A website has claimed to have posted subscriber data of Reliance Jio customers, including email IDs, names and Aadhaar numbers, on the website magicapk.com. Hours after the initial reports of the data being posted on the website on Sunday, it was suspended.

Read more on this news.

How To Reduce Your Chances Of Falling Foul Of Ransomware – And How To React If You Do?

The WannaCry ransomware attack took the world by storm last month, successfully claiming 200,000 victims across 150 countries – and with some high-profile casualties, including the NHS. It spread quickly and was highly disruptive – grabbing news headlines across the globe and putting IT security in the spotlight.

Of course, WannaCry was not the first – nor is it likely to be the last, as we have seen with the Petya attack, – a form of ransomware that can be distributed by cyber-criminals. However, this should serve as a warning to organisations that they need to start taking urgent steps to protect themselves against this serious malware.

So, in the aftermath of an attack, what steps should organisations be taking to reduce their risk of falling victim to ransomware? 

Luke Potter, SureCloud’s Cybersecurity Practice Director, looks at what organisations can do to minimise the risk of a falling victim to a ransomware attack – and offers advice on how to respond if you do