Page 37 - Cyber Warnings
P. 37
personal and/or business data is to use a prepaid cell phone for the trip or offload your data before
traveling.
Then, avoid logging into secure work or personal systems, and even if your device gets hacked, no
damage is done. For even better protection, install an app that will allow you to remotely wipe the
device in case it gets lost or stolen.
Know the Warning Signs of a Malicious Attack
No matter what precautions you've taken, it's always possible to get hacked or to pick up malware.
Experts estimate that most devices will be infected by malware within an hour of arriving at the most
dangerous locations, such as China.
If the phone begins giving you warnings, pop ups, starts crashing, or otherwise behaves strangely,
shut it down immediately. Those are signs of malware.
For more information on detecting and preventing attacks on your mobile devices, watch our
webinar: How to Predict, Detect and Protect Against Mobile Cyber Attacks.
About the Author
Varun Kohli is Vice President of Marketing at Skycure. Varun has held
leadership positions in marketing, product management and product
development at both startups and large companies, and is on the
advisory board of many startups.
Both he and his work have been featured in major publications such
as Daily Mail, Wall Street Journal, Huffington Post, MarketWatch and
USA Today. He has also appeared in broadcast outlets such as
NBC’s The Today Show, MSNBC, FOX, Kron4, ABC, and CBS.
In the past, Varun has been a crucial part of multiple successful exits such as IronPort Systems
(acquired by Cisco), CipherTrust (acquired by Secure Computing then McAfee and then Intel) and
most recently ArcSight, which was acquired by HP after going IPO in 2009.
Varun earned his Bachelor of Technology in Computer Science from the Indian Institute of
Technology, Guwahati, India, his Master of Science in Computer Science from the University of
California, Riverside and studied marketing at University of California, Berkeley.
37 Cyber Warnings E-Magazine – January 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide