Page 42 - Cyber Warnings
P. 42
Cybersecurity: Why Your Cell Phone is Your Weakest Link
The internet of things. It’s a wonderful product of society’s love of technology and needs to
make daily tasks more efficient. Think about it. How many devices do you own? Most people
today have at the very least a smartphone, computer, and tablet.
These devices all share data, so you don’t have to worry about which device you downloaded
“Monster Mash” on for the kids to listen to in the car. All devices can play the song.
This idea of convenience has transferred not just through electronic devices but to other
common household items. Today, homeowners can buy anything from a smart car to a smart
fridge.
While smart home automation isn’t by itself insecure, any one of these everyday household
objects is hackable. Why? They’re all controlled by your smartphone.
Small Devices, Big Security Risk
While most people know to install antivirus on their computers, not as many people think to add
this protection to their smartphone, and even less think that they should protect their smart
fridge or thermostat.
Any IoT device can be compromised if someone hacks your cell phone. What makes matters
worse is that these hackers can then pivot from device to device and gain access to other
devices like your tablet and computer.
This scenario involves just one home. Imagine every smartphone in the country getting hacked
due to this security fall.
Homeowners are the only ones vulnerable, though. A 2015 study by Check Point Software
“found that organizations with more than 2,000 devices on the network have a 50% chance that
at least six of them are infected.”
With many companies opting for “Bring Your Own Device” programs, proper cybersecurity and
has become critical for company success. Since personal cell phones can’t be monitored, it
makes it harder to monitor.
If one of your employees decides to go out to Starbucks, for example, and connects to their wifi
while there, they could actually be connecting to a dummy wifi-signal masquerading as
Starbucks. Hackers can use Pineapple Wifi to view and collect any information transmitted over
this signal goes directly back to the hacker.
As a business owner, you should do more than just hope they don’t open any company emails
while on their coffee break.
42 Cyber Warnings E-Magazine October 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide