December 11, 2012
rcriminals have developed more sophisticated versions of malware and phishing attacks that may compromise personal information. Consumers should be aware of current and future dangers that may threaten their privacy, and learn about the proper network security measures to protect confidential data.
Because the bring-your-own-device (BYOD) movement has gained momentum in the past year, hackers have taken advantage of uneducated professionals by targeting personal smartphones and tablets, including Androids. Most cybercriminals attack Androids because the majority of the population who participate in BYOD use one.
For example, many hackers compromise websites based on keywords a person may type in to a search engine about Android. According to Android Authority, the latest threat centers around people who look for USB drivers online to connect their phones to their desktop computers. Uneducated users may click on links that send them to fake application stores. If they install an app, a hacker can charge them large sums of money.
As more workers employ BYOD to conduct business, it may become difficult for professionals to identify dangerous sites on their mobile devices, GCN reported. Screens on smartphones and tablets are smaller and lack security indicators, making it difficult for employees to recognize a malware-infested page. Experts at GCN also found that 10 of the most used mobile browsers could not determine if they visited a malicious site.
Threat predictions for 2013
IT departments must be prepared to block emerging threats in the next year. According to security predictions by WatchGuard Technologies, there will be an increase in malware that enters virtual machines (VMs), which can control devices, ITWeb reported. Consumers must also be on the lookout for dangerous browsers they may use to enter personal information into banking sites hosted on cloud servers.
Steps to protect files
Until the United States government passes a cybersecurity act outlining standards that all private companies must follow, it is up to employers to ensure data protection. As attacks become more frequent, business owners should make it a priority to implement data loss prevention measures. IT departments are encouraged to educate employees on the proper use of the internet, including the importance of complicated passwords, encryption and two-factor authentication. Professionals should also be careful when opening emails by checking who sent them, and should stay away from third party stores by only purchasing applications from Google Play.
-McAfee Cloud Security