Se dice que un telefono Smartphone, es una microcomputadora en la palma de la mano. Entonces, cuales son los probables riesgos de seguridad que pueden generarse de un uso descuidado?
La mayoria de la gente no se da cuenta que sus telefonos celulares son igual de vulnerables de ataques ciberneticos como lo podrian ser sus laptops o computadores de escritorio, Hoy en dia, los Smartphones se han convertido en el blanco predilecto entre los Hackers y creadores de Malware. La amenaza mas comun a la seguridad de nuestros telefonos celulares, es simplemente que el aparto caiga en manos de alguien con malas intenciones. El robo de informacion comienza con la perdida o robo del telefono generalmente. Por ello, tenemos que ser cautos y precavidos en relacion a como lo llevamos, donde lo colocamos mientras estamos en lugares publicos; donde alguien lo podria sustraer con facilidad o robarlo. Debido al aumento de robo de informacion contenida en los celulares, muchos fabricantes utilizan una condicion de contraseña de seguridad para asegurar la informacion almacenada en el SmartPhone. Por consiguiente, es nuestra responsabilidad usar este metodo y proteger nuestras claves y contraseñas para que no puedan ser facilmente descubiertas o vulneradas - sino hacerlas mas complejas.
Most people are unaware that their cell phones are just as vulnerable to cyber attacks as their laptops or desktops. Today, Smartphones have become most popular target among hackers and malware producers. The most common threat to the security of our cell phones is simply for the device to fall into wrong hands. Data theft begins with lost or stolen phones in most cases. Thus, we have to be very careful and thoughtful as how we carry, where we place them while in public places for someone to easily grab or steal them. Due to increase in data theft through cell phones, Blackberry, iOS and Windows phones use a secure password feature to secure the data in our cell phones. And its our responsibility to use this feature and secure our passwords that they are not easily guessed or broken but are relatively complex.
Deseas, mayor informacion en español? Escribeme un mensaje
Similar to every computer or laptop, a strong password alone is not enough to protect our data/information, need an strong software to help us recover the lost or stolen data and to wipe it if one is unable to retrieve. In the same way our cell phones too need a line of software that will help to turn off the phone’s screen and disable it when the password input is incorrect, preventing an attacker from being able to easily access our data/information. At the same time we are supposed to ensure that we do not save important bank accounts’ information or personal data as default information on our cell phones. Once anything personal like bank accounts are accessed on cell phones they must be logged off and ensure nothing is stored on. How much secure software has been implemented, how many secure features are implemented, its on us as to how careful we are with the data and information we...
Comentarios
Publicar un comentario