Immunise your gadgets against viruses

Comment on this story
iol scitech aprl 3 CT injection done REUTERS EN GUARD: Mobile security is becoming increasingly important for smartphone users to protect themselves from viruses.

The world has become increasingly mobile and technology has evolved so that cellphones have become smartphones, along with tablet PCs and other mobile devices allowing always-on connectivity. Such devices have revolutionised the way we work and have grown in popularity in recent years, largely because these mobile devices all feature internet connectivity, opening the “”Pandora’s box”, so to speak.

This connectivity opens up new avenues for cybercriminals with malicious intent to exploit users.

In the cybercrime industry, as with any profitable business, the smart enterprise goes where the customers are.

As more users migrate on to a variety of mobile platforms, from BlackBerry to Android, Windows Mobile, Apple Mobile OS and even tablet devices, cybercrime is increasingly targeting these platforms as methods for the perpetration of malware, including viruses, spam and spyware, all with the express purpose of making money.

Enter the virus killer app for your mobile device.

Users are now vulnerable to viruses that can shut down their smartphones, identity theft as a result of spyware and the entire gamut of threats that were once the exclusive realm of computers.

As a result, mobile security is becoming increasingly important for users to protect themselves from falling victim to malicious activity.

Aside from the threat of malware, the increasing trend towards mobility along with tools such as push e-mail functionality also means that more personal and business information is now stored on highly portable devices.

The greater the levels of portability, the greater probability that the device, and the information it holds, may be lost or stolen.

Having personal and business critical information falling into the wrong hands is undesirable for obvious reasons, and the ability to remotely wipe the device in the event of it being misplaced is another strong reason that mobile security is so important in today’s world.

When looking for a mobile security solution to protect devices such as smartphones and tablets from malware and to ensure personal information does not fall into the wrong hands, there are several features to look out for, which take care of security in the event of loss or theft and also help to prevent malware attacks from causing problems on the device and prevents cross-infection of other devices.

Remote locking capability is one crucial feature, which lets you remotely disable a lost or stolen phone to prevent strangers from accessing private information.

It also prevents thieves from using the device, so that they cannot run up large phone bills at your expense.

This – combined with SIM card-locking capability, which instantly locks your phone if its SIM card is removed so that thieves cannot use it with a different SIM card – ensures that even if your phone is stolen, the thieves will not profit from it as the device is effectively rendered unusable. Remote wipe is also critical, as this lets you erase all of the information contained on your phone if it is lost or stolen, including contacts, SMSes, call history, browser history, bookmarks, and any data on the phone’s memory card.

Mobile threat protection will detect and remove malware such as viruses and other threats without affecting phone performance, and download threat protection will automatically scan all files and app updates for threats.

Aside from these now vital security components, a comprehensive mobile security solution also lets you block calls and SMSes from specific phone numbers, perfect for getting rid of annoying spam SMSes and unwanted callers.

Mobile devices are increasingly common, which makes them more and more vulnerable to attack.

Protecting all of the personal information stored on your mobile device is of the utmost importance to prevent common issues such as identity theft, and mobile security is no longer a nice to have, but a necessity for both consumer and business users in the modern world. - Cape Times

l Mitchell is Symantec business unit manager in SA

Hungry for more scitech news? Sign up for our daily newsletter

sign up

Comment Guidelines

  1. Please read our comment guidelines.
  2. Login and register, if you haven’ t already.
  3. Write your comment in the block below and click (Post As)
  4. Has a comment offended you? Hover your mouse over the comment and wait until a small triangle appears on the right-hand side. Click triangle () and select "Flag as inappropriate". Our moderators will take action if need be.

  5. Verified email addresses: All users on Independent Media news sites are now required to have a verified email address before being allowed to comment on articles. You are only required to verify your email address once to have full access to commenting on articles. For more information please read our comment guidelines