With technology advancing at a rapid pace, little room is left to
dispute whether cyber terrorism is a valid threat. At an interview
conducted by Zdnet, Mr. Art Coviello expressed his concerns regarding
cyber terrorism. The availability of malicious software threatens to
spark cyber warfare coupled by augmented use of smart phones at the
workplace.
He
was keen on emphasizing how easily cyber-warfare could get out of hand
and can lead to escalation on an international level. Additionally, he
showed great apprehension regarding professionals utilizing mobile
business software to improve their productivity, which can also infect
portable devices with sophisticated mal-ware, in essence, putting
themselves at a greater risk of being attacked by cyber criminals.
Hostile nations and cyber-criminals have subjugated the same weaknesses
and are likely to use such a mal-ware to launch an attack on a
widespread level. Coviello urges anyone purchasing smart mobile devices,
capable of considerable computing power should be aware of the risks.
Suppliers/manufactures should take the first step towards securing
portable devices with fool-proof security software before introducing
them to the consumer marketplace.
Data security Analyst Jonathan Ladd agrees, a renowned specialist on
data encryption and information security; he points out that, it’s not
only smart phones that are a cause for concern, it’s also transportable
storage devices such as movable hard-drives and flash drives (thumb
drives). More often than not, folks unknowingly store their personal
information on such devices. In some instances, people end up losing
these devices with private data stored on them, and if those devices
fall into the hands of criminals, they are likely to have their identity
stolen. To make matters worse, the majority of the victims find out
when it’s too late, and that their identity has already been used to
conduct illegal activities. Ladd, emphasizes that anyone storing such
data on compact drives should secure USB drives and compact hard-drives with third party data security software.
Saturday, 1 December 2012
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment