More important is that individuals understand the vulnerabilities in mobile usage and practice secure usage to bring a holistic change in the cybersecurity system
The article has been written by Manish Mimani, Founder & CEO, Protectt.ai.
Our daily life experiences and decisions are now becoming more and more mobile-centric. From being a device or medium to communicate, the mobile phone has become a way of life. From meeting new people, to chats & conversations, to ordering food and cabs, from booking travel & stay to banking and to deciding where to invest, everything is done through a few touches & swipes on the smart mobile. India has 1.18 billion mobile connections, 700 million internet users, and 600 million smartphones, which is increasing by 25 million per quarter. As per a Deloitte study, India will have 1 billion smartphone users by 2026 with rural areas propelling the sale of internet enabled phones.
Increasing smartphone penetration in the Indian market has definitely brought digital ease. However, this has also resulted in increase in data threats to the entire technology ecosystem. With online education through mobile phones becoming commonplace, children and teens are also being targeted by cyber attackers.
In this cybersecurity awareness month, let us look at some of the ways hackers can attack your personal data to misuse it.
Phishing is one of the most common attacks where hackers send phony messages, emails, and even make fraudulent vishing (Voice Phishing) calls. They often send a link convincing people to click on it and once you do, your data could be stolen, or a malware could be planted or money could be siphoned off from your account.
These attacks can be subtle which means that we may not know the vulnerable areas in our phones that can be used by hackers to enter the system. Apps provide hackers with stealthy access to your device, allowing them to simply reach your mobile banking app and launch numerous degrees of crimes.
Fake apps are another cybersecurity threat, which may appear harmless, but can extend their access to a number of features in smartphones. They may look and even function like regular apps that you already have on your phone. This could result in a number of cyber security risks.
Unsecured Network: Often, connecting to a public Wi-Fi seems okay, but could be worse as these open networks give easier access to your phone’s security. Hackers can often create fake networks that appear real but could be used to steal your personal data.
Cyberattacks on your phone’s systems could result in losing money, identity theft, or losing valuable personal data. The need to keep them at bay was never more important than now. This is why; mass awareness campaigns on App binding through zero trust principles, multi-factor authentication, biometrics, and end-to-end encryption are a must to safeguard the interests of Digital India.
As the ever-increasing mobile and internet penetration in India is boundless, there is a pressing need to address critical entry points for cyberattacks. Designated laws should be framed to protect the cyber space and the digital ecosystem. But, before that, what is more important is that individuals understand the vulnerabilities in mobile usage and practice secure usage to bring a holistic change in the cybersecurity system. Downloading mobile apps from verified genuine sources only (from operating system’s Appstore/ playstore), uninstalling apps that are no longer in use, using only secured Wi-Fi/ Bluetooth connections, being wary of phishing, vishing and smishing attacks are some of the practices that will save you from the cyber threats hovering around the mobile usage.
Also read: Digital transformation is the new normal
Do Follow: CIO News LinkedIn Account | CIO News Facebook | CIO News Youtube | CIO News Twitter
About us:
CIO News, a proprietary of Mercadeo, produces award-winning content and resources for IT leaders across any industry through print articles and recorded video interviews on topics in the technology sector such as Digital Transformation, Artificial Intelligence (AI), Machine Learning (ML), Cloud, Robotics, Cyber-security, Data, Analytics, SOC, SASE, among other technology topics