Page 44 - index
P. 44







First, recognize that mobile devices are the new primary target. Be alert. Be cautious. If you
receive an email with a link in it that you don't recognize, don't click on it. Doesn't matter if it is your
laptop or your iPhone. Seriously, don't do it.

Second, keep your virus protection up-to-date on your computers even though it may be annoying
to purchase annual licenses and we are all a little suspicious of the virus protection vendors. But, in
the likelihood that you need to connect to your computer with your mobile devices, you don't want to
leave an open door for criminals to infect your devices from your laptop.

Third, recognize that juice-jacking is the number one opportunity for mobile device infections - so,
when you plug your phone into any USB port, you are extremely vulnerable to attacks. Read up on
the recent WireLurker juice-jacking virus and your knees will rattle a bit. You are especially
vulnerable while on travel - when you often have no choice but to charge through a USB port and
have no way of knowing what you are plugging
into. ChargeDefense’s product, the Juice-Jack
Defender® is guaranteed to block identity theft
code and malware when connected to a USB
95
outlet. It's a $15. no-brainer. If you don't have
a Juice-Jack Defender® and must connect to an
unknown USB port, at least keep your mobile
device locked. And for goodness sake, put a password on your device! But, even those
precautions are no guarantee that a hacker can't find a way in.


The bottom line is this: Don't be naïve. YOU ARE THE TARGET OF CYBER CRIMINALS. Be
smart. Protect yourself. Use common sense precautions. And, remember that it isn't just
computers anymore. That wonderful mobile device that you carry around with you everywhere
needs the same level of protection and precaution as your laptop computer. Be safe.

About the Author

Stuart McCafferty

Like us on FaceBook and get special discount deals: www.facebook.com/chargedefense














44 Cyber Warnings E-Magazine – February 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   39   40   41   42   43   44   45   46   47   48   49