- mainstreet - Where technology goes, so do hackers
Terry Cutler Cyber security expert ethical hacker  - portrait sirco commercial montreal 62 200x300 - Where technology goes, so do hackers

Terry Cutler Cyber security expert ethical hacker

Mobile adoption and capabilities; anywhere from access to email, applications, the Internet and company data, is expanding, and so is our ability to stay in touch with family and co-workers, while building larger databases, and adding information to our lives, especially on our laptops and phones. Where goes, and grows, so do . If get into your network, (and they may already be there), there is a great chance they got in through an open door on your device. When it happens, it usually means bottom-line problems for companies, because will be snaking and slithering through the back end of your networks, looking for opportunities to profit from your distress.

The build-up of data, multiplied by the growth in Smartphone usage, and advancing technologies, means that one day a massive attack on your sensitive company data could have begun its path to destruction, through a laptop or Smartphone. Smartphones were once simple tools to make basic calls, but now they contain features that are normally found on computers. In the past, the ability to send and receive e-mails, search the Internet, and work remotely was restricted to the office or laptop computers. The Palm Pilot of the late 1990s, for example, could sync with a computer, but for the most part was a secure personal database, known as a digital assistant, that stored data. The biggest security concern was losing the storage device and having someone steal your information.

- mainstreet page13 16 copy - Where technology goes, so do hackersNow we can create and edit Office , download apps with personal and business managers, personal assistants, or obtain GPS directions; the
list of apps is endless and growing. The list of possibilities is also endless for a hacker. What the hacker can do today may also be twice what he, or she, can do tomorrow. Data theft is the biggest danger regarding Smartphone usage, because these devices are excellent tools for enabling the theft of data.

Here are a few tips to protect your phone: 

Use a pin, password or pattern to lock your phone.

For devices, go to your Location & Security Settings.

Apple IOS users can find these functions in the General
Options of their settings. Avoid all simple four number passwords.
Never store your usernames and passwords on your phone. Download apps only from trusted stores. Make sure you check ratings and reviews if they are available.
Sometimes these apps might need access to your phone features if you download. You will find which ones in the App privacy policy. Log out of sites after you make a payment. Many of us do banking online using our phones.

If you don’t log out of those sites once your transaction is complete, you are vulnerable. So when companies issue Smartphones to their without security, hoping for bottom-line rewards, they may be asking for a lot more problems than they bargained
for, which could indeed hollow out their bottom lines.

Just remember, if a hacker gets access to your passwords, your life could change forever.

Terryble Tymes

tcutler  - portrait sirco commercial montreal 62 80x120 - Where technology goes, so do hackers


VP of Cybersecurity at SIRCO
I’m Terry Cutler, the creator of Insider Secrets from an Ethical Hacker on Internet Safety …That’s a system that’s been used to help defend corporations and individuals from cyber threats.
I’m a government cleared cybersecurity expert (a Certified Ethical Hacker), and the Vice-President of Cyber at SIRCO, an investigations and protections firm in Montréal, Canada.
I’m also a frequent contributor to National & Global media reportage about cyber-crime, spying, security failures, internet scams, and the real social network dangers that families and individuals face every day.
tcutler  - portrait sirco commercial montreal 62 80x120 - Where technology goes, so do hackers

Latest posts by tcutler (see all)

Source link
Based Blockchain Network


Please enter your comment!
Please enter your name here