Terry Cutler – The Ethical Hacker
Hacker
Home » Where technology goes, so do hackers
Internet Safety Media Spotlight

Where technology goes, so do hackers

Terry Cutler Cyber security expert ethical hacker
Terry Cutler Cyber security expert ethical hacker

Mobile adoption and capabilities; anywhere from access to email, applications, the Internet and company data, is expanding, and so is our ability to stay in touch with family and co-workers, while building larger databases, and adding information to our lives, especially on our laptops and phones. Where technology goes, and grows, so do hackers. If hackers get into your network, (and they may already be there), there is a great chance they got in through an open door on your device. When it happens, it usually means bottom-line problems for companies, because hackers will be snaking and slithering through the back end of your networks, looking for opportunities to profit from your distress.

The build-up of data, multiplied by the growth in Smartphone usage, and advancing technologies, means that one day a massive attack on your sensitive company data could have begun its path to destruction, through a laptop or Smartphone. Smartphones were once simple tools to make basic phone calls, but now they contain features that are normally found on computers. In the past, the ability to send and receive e-mails, search the Internet, and work remotely was restricted to the office or laptop computers. The Palm Pilot of the late 1990s, for example, could sync with a computer, but for the most part was a secure personal database, known as a digital assistant, that stored data. The biggest security concern was losing the storage device and having someone steal your information.

Now we can create and edit Microsoft Office documents, download apps with personal and business managers, personal assistants, or obtain GPS directions; the
list of apps is endless and growing. The list of possibilities is also endless for a hacker. What the hacker can do today may also be twice what he, or she, can do tomorrow. Data theft is the biggest danger regarding Smartphone usage, because these devices are excellent tools for enabling the theft of data.

Here are a few tips to protect your phone: 

Use a pin, password or pattern to lock your phone.

For Android devices, go to your Location & Security Settings.

Apple IOS users can find these functions in the General
Options of their settings. Avoid all simple four number passwords.
Never store your usernames and passwords on your phone. Download apps only from trusted stores. Make sure you check ratings and reviews if they are available.
Sometimes these apps might need access to your phone features if you download. You will find which ones in the App privacy policy. Log out of sites after you make a payment. Many of us do banking online using our phones.

If you don’t log out of those sites once your transaction is complete, you are vulnerable. So when companies issue Smartphones to their employees without security, hoping for bottom-line rewards, they may be asking for a lot more problems than they bargained
for, which could indeed hollow out their bottom lines.

Just remember, if a hacker gets access to your passwords, your life could change forever.

Terryble Tymes

Subscribe to our mailing list

* indicates required

Related posts

fake press releases on climate change in Copenhagen – 7 minute interview on the CBC home run show

Terry Cutler

Special Report on Ethical Hacking, Identity Theft, Credit Card Fraud TV interview on CBC the National

Terry Cutler

Buyer beware ! One Direction concert ticket scammers on Kijiji

Terry Cutler

Keeping tabs on kids using GPS tracking technology

Terry Cutler

Hacker bites into Montreal student’s savings

Terry Cutler

Special Report on Ethical Hacking TV Interview with CTV Montreal

Terry Cutler

LEARN THE SECRETS OF THE WORLD’S MOST SUCCESSFUL CYBER SECURITY EXPERTS. Close I'm Interested

Privacy & Cookies Policy