Abstract
Most organizations and businesses have reported a loss of billions of money while others have become bankrupt leading to closure. Security breaches have propagated most of these events due to the kind of technology implemented. Mobile devices and Internet connections have been on top of the list. As technology keeps on evolving, different convenient methods of communication and accessing information keeps on improving. This evolution leads to new cybercrime activities which have posed to be a significant threat to financial growth in different economic sectors. However, there have been the implementation of new methods to curb the security breaches which are noted to have taken time in catching up with the current situation in cybercriminal activities.
Introduction
Technology has been one of the main focus areas in many institutions. In the past few years, technology has revolutionized to serve a human purpose in the most efficient way. Communication being one of the affected areas in many institutions has led to the innovation of the simplest and best ways to reach out to as many people as possible. Use of mobile devices has been the best remedy. According to statistics, in the past few years, mobile communication has been on the rise as compared to other media. It has been estimated that over four billion people depend on mobile devices in accessing information and also for communication which includes businesses, corporation’s parastatals, Government agencies, and tertiary educational institutions. Therefore, to get privatized organizational information, and hack into any business accounts mobile devices had posed to be the biggest threats. According to the business daily news (Business daily news, 2016 )more and more employees have been on the rise in accessing information through mobile devices making it a huge security threat. According to the security threat 2014, as many innovators have come up with many ways of accessing information through various web servers and mobile devices, so have the hackers improved their ways of initiating their cyber-criminal activities. This research will focus on the different security risks associated with frequent use of mobile devices in organizations as stipulated the security threat report 2014.
What are the major upcoming security threats?
Android devices have become one of the primarily targeted devices as far as security is concerned. Being one of the biggest mobile operating systems, specifically for smartphone devices, mobile devices have become vulnerable since hackers have come up with various ways of retrieving information from them. According to the security threat report, since the first detection of Android malware in the year 2010, there have been many cases of malware attacks which are projected to be over 400. Ways used to attack these devices includes using of botnets. They are small source codes used to manipulate or change the functionality of a device. For example, when a mobile device has been attacked through botnets, might modify the encryption information or even make a user overcharged when sending SMS to other people. It also leads to conversion of many accounts to premium accounts. Secondly, as stated in the security threat 2014, Ransomware poses to be a significant risk to mobile devices especially the ones using the Android operating system. It makes files on one’s phone inaccessible and after that, the hackers will demand a fee to free them. Hackers have used this attack through fake antiviruses that end up encrypting all the files on the device. This attack was discovered 25 years ago.
Apart from the mobile devices attacks, other major security issues as stated in the report include the web-based attacks which include dark leech which became one of the most vulnerable attacks that have compromised most of the web addresses and also websites. Secondly, malware advertising is still common to date. Hackers use advertisements to install malware on one’s device. Through this method, the hacker gets the rights to manipulate the computer and use it for his personal satisfaction.
According to the report, devices using the Mac operating system have not been left out. One of the most frequent attacks on these devices is the Trojan. This kind of security breach is evident in the Asian country as they have been identified to be hiding in word documents. This is an attack that has been so popular not only in Asia but globally. Hackers use legal ways and documents to get the users attention.
Being one of the safest operating system Linux also suffers various cyber-attacks. Due to its high level of security, hackers have been working so hard to find loopholes, in particular with the Linux servers. As far as security is concerned, when using electronic devices especially when accessing the internet has become very dangerous for financial situations in many companies. To prove this point, a wolf in the ship clothing attack has been very popular to gain a user’s financial data. It starts out as a legitimate application which prompts the user for installation, not knowing that there is a malware hidden in it. The code integrated into the application documents are used in accessing an individual’s personal information.
Security threats affecting mobile devices
Mobile devices have become very popular among many people and institutions. It has also been proved that mobile devices have outdone the standard Computers regarding sales and marketing over the past few years. Though, security measures imposed upon mobile devices especially the ones with computer capabilities have become vulnerable to security threats. There are various methods used in attacking mobile devices.
Malware
Malware has been used for different specific reasons to attack mobile devices. As it is evident in the security report 2014 most of the bank accounts are hacked by use of mobile devices. As indicated by James Imgraben and others (Imgrabe, Engelbrecht, & Raymond Choo, 2016), continuous increase in mobile devices have taken the malware authors attention and has led them to come up with new ways of attacking mobile devices through the use of malware. Commonly Malwares are used in acquiring users login credentials to a specified account or subscription for criminal gains. This has led to hackers freezing other people’s accounts.
Ransomware
Ransomware is also emerging as one of the most common methods that hackers use in attacking mobile devices. Through this method, hackers ensure that all files within and individuals device are not accessible. This is done by changing the configuration details leading to weakening of the phones or mobile device security. After the hackers make it difficult for the users to access their personal files or information through their cell phones, they will have to charge some amount to free the account. These capabilities are mainly characterized by the fact that mobile devices are less secure. According to a report conducted by Paul Ruggiero and Jon Foote (Ruggiero & Jon Foote, 2016) states that the reason why cybercrime has increased among the mobile devices due to their continuous increase over the market and also because mobile devices are more vulnerable than other computers. This is because mobile devices can connect to various wireless connections, have access to emails and other personal information.
Unauthorized access
Most congested organizations suffer greatly from unauthorized access to their mobile devices. Most people leave their devices unattended leading to them being accessed by potential hackers especially when no locking mechanisms are put in place by the users.
What can be done to curb security menace in mobile devices?
Although there has been many problems and losses associated with mobile devices security, many scholars have done lots of research and have come up with various ways and methods of reducing security threats among institutions and businesses as far as mobile devices are concerned. The following are some of the remedies to security problems in mobile devices.
Through encryption
Most of the mobile devices are too small and are prone to get lost so easily. To ensure that the data contained in the device is safe and secure, it is imperative to encrypt data on the device especially the private and personal data (IJIRTS, 2016). Encryption involves converting of valuable information in the device to a state which is no longer human readable. This method has been very instrumental for many people especially business and corporations.
Enabling Power-on authentication on mobile devices
Power on Authentication is a security method where one locks up the Bios of a given device during the startup process. In case the mobile device is off, it will be tough for another person to gain access to information contained in the device since it is password protected even during its startup (IJIRTS, 2016).
Through installation of antivirus software
Antiviruses come in handy in ensuring a safe environment during execution of software. Attacks that can be handled through the use of antivirus includes viruses and Trojan horses. Though this also poses another threat since antiviruses are also used in launching viruses in various programs(IJIRTS, 2016).
Reason why mobile devices are more vulnerable to security attacks.
In reference to the articles, it is clearly evident that mobile devices are more susceptible to attacks and security threats when compared to other devices. To support this statement, manof the internet users worldwide use their mobile devices to do their research, business transactions and also for research and communication. This has therefore brought the attention of the malware creator and hacker to fit in the upcoming market. Additionally, the economy in most of the continents is moving towards a cashless economy. This means that people will have to transact using their mobile phones or either through their ATM cards. This brings about a lot of hacking and destruction of lots of financing activities.
Which poses to be the most alarming security threat?
When compared to other security issues, threats to financial accounts represents to be the most frightening threat. Many organizations depend on finances in the daily running of business operations. Hacking on an organization financial account proves to be very dangerous for the survival of the firm to both the owners and the employees. It might lead to rendering most of the people jobless. To curb this menace, it will be paramount for the organization to ensure that its servers are thoroughly maintained and monitored. Secondly, it can be through sensitizing and teaching employees about the dangers of giving out private information about a business or organization. This can also be done through encrypting of organization information to protect unauthorized viewers from accessing the private data about a company.
In conclusion, for better survival of businesses and organizations in the technological sector, it's up to every person to take action and protect their devices from security threats. Education and training would be the best remedy to curb the problem since most people are affected due to the lack of knowledge concerning various security threats over the web or when using mobile devices.This will save many individuals and organizations from financial suffering due to frequent attacks.
References
Britt, P. (2016). 10 Trickiest Mobile Security Threats - eSecurity Planet. Esecurityplanet.com. Retrieved 22 August 2016, from http://www.esecurityplanet.com/mobile-security/slideshows/10-trickiest-mobile-security-threats.html
IJIRTS, (2016). Issues, Solutions, and Recommendations for Mobile Device Security, 5-10.
Imgrabe, J., Engelbrecht, A., & Raymond Choo, K. (2016). Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. 1.
ManageEngine, c. (2016). Mobile Device Management software by ManageEngine Mobile Device Manager Plus. ManageEngine Mobile Device Manager Plus. Retrieved 22 August 2016, from https://www.manageengine.com/mobile-device-management/mobile-security-management.html?gclid=CLCTtLmH1M4CFfMW0wodmdsP1A
Mobile Devices Will Be Biggest Business Security Threat in 2014. (2016). Business News Daily. Retrieved 22 August 2016, from http://www.businessnewsdaily.com/5670-mobile-devices-will-be-biggest-business-security-threat-in-2014.html
Ruggiero, P. & Jon Foote, (2016). Cyber threats to mobile phones, 1, 2-5.
Sophos, (2016). Security Threat Report 2014, 1-26.