Offgrid Preparation Infographic: The Rise in Smartphone Security Threats
A few decades ago, the idea of carrying a powerful, internet- and GPS-connected computer in your pocket would have seemed like the stuff of science fiction. However, smartphones have now become so ubiquitous that it's unusual if you don't carry one. They offer incredible convenience as an all-in-one tool for communication, navigation, mobile banking, social networking, and entertainment, but this power is increasingly being leveraged against us by cybercriminals. Smartphone security threats such as malware apps, phishing attacks, and connection to unsecured WiFi networks can turn our most-used piece of tech into a serious problem.
Since October is National Cybersecurity Awareness Month, this is a timely reminder that digital security isn't only relevant to your desktop or laptop computers. It's especially relevant to the computer that resides in your pocket.
The following infographic from Scalefusion MDM collects data from cybersecurity companies such as Kaspersky, McAfee, and Check Point to illustrate the growing trend of mobile security threats. Specifically, Check Point's 2019 mid-year report says that there has been a 50% increase in mobile device cyberattacks compared to 2018. For an especially sobering illustration of the seriousness of the problem, refer to the company's Live Cyber Threat Map, which tracks cyberattack victims and perpetrators in real-time.
Take a look at the Scalefusion infographic below for an overview of common mobile device threats, or click here to download the full-size version.
MDM means Mobile Device Management, a type of business-oriented software that allows an IT department to centrally manage employees' mobile devices. MTD is Mobile Threat Defense, software specifically designed to enhance security on those devices. Unless you own a business or work in IT, you can skip the last third of this graphic, since it applies to enterprise-level software. However, the first two-thirds are very relevant to our awareness of individual device security.
We'll close with some additional reading on the top 5 mobile security threats mentioned above:
No Comments