Digital security in the age of mobility

On line shopping – up

Mobile device use – up

Smart device use – up

We use our mobile devices for practically everything.    From ordering a pizza from the local pizza shop late at night, buying clothes from our favourite designer in the US, paying bills and socializing with our friends.  Oh and I forgot – photographing food!

The convenience and cost of our smart devices is driving our uptake.   We all want the latest and greatest smart device from Apple, Samsung or Sony and we know that we can get it on a plan for minimal amount of money per month.

So convenience and cost are driving the uptake – “How do we secure these devices?”

In most cases we do not even consider protecting our smart devices.

It’s just a phone!

It’s just a tablet!

Well isn’t it?

We store information on our smart devices that we would have major problems living without.

We place and answer our mobile phones using our own version of call management – not numbers but names.   Can you remember your best friend’s phone number?   I sure as hell can’t!

We have our credit card and banking information in secure and non-secure apps – could you remember your bank account number!   Once again, I sure as hell can’t.

In my world and when it comes to digital security, understanding the concept of protection on mobile devices, from the operating system and apps level, through to the user level is mostly non-existent.

The firewalls we use are paper thin, there is minimal reason for the manufacturer to protect the device from malware and in some cases purchases through apps is non encrypted and all conducted in plain text.

Then we have free WiFi.

All of which leaves you vulnerable to attack by the digital criminal.

If we were doing any of this on a computer or a laptop we would be horrified.   On a smart device it is just “how it all works!”

So here’s an idea!

Treat your smart device like a computer.   A small really powerful computer, but a computer non the less.   Today’s smart devices have more power that what NASA used to put Neil and his mates on the moon.

Treating your device like a computer entails – updating it when necessary, installing anti-virus and a firewall, using complex and unique passwords and in all respects “BACK IT UP”.

We are so lucky, smart devices have changed human civilization but in most cases we treat them with contempt.

Roger Smith is the CEO of R & I ICT Consulting Services, Amazon #1 selling author on Cybercrime, author of the Digital Security Toolbox and author of the SME Digital Security Framework.   Rapid Restart Appliance Creator.   He is a Speaker, Author, Teacher and Educator on cybercrime and how to protect yourself from the digital world. 

Roger Smith, is an educator. Teaching students at ADFA (UNSW) and showing them how vulnerable they are to cybercrime.

He is also CEO at R & I ICT Consulting Services Pty Ltd, an Amazon #1 author on Cybercrime and founder of the SME Security Framework. He is a Consultant who specialises in inexpensive and highly effective security strategies for small and medium businesses and not for profit organisations.

He has developed and authored the SME Security Framework and the Security Policy Training Course which are considered to be the definitive guides to helping SME's protect their organisation using the principles of Technology, Management, Adaptability and Compliance.