With technology advancing at a rapid pace, little room is left to dispute whether cyber terrorism is a valid threat. At an interview conducted by Zdnet, Mr. Art Coviello expressed his concerns regarding cyber terrorism. The availability of malicious software threatens to spark cyber warfare coupled by augmented use of smart phones at the workplace.
He was keen on emphasizing how easily cyber-warfare could get out of hand and can lead to escalation on an international level. Additionally, he showed great apprehension regarding professionals utilizing mobile business software to improve their productivity, which can also infect portable devices with sophisticated mal-ware, in essence, putting themselves at a greater risk of being attacked by cyber criminals. Hostile nations and cyber-criminals have subjugated the same weaknesses and are likely to use such a mal-ware to launch an attack on a widespread level. Coviello urges anyone purchasing smart mobile devices, capable of considerable computing power should be aware of the risks.
Suppliers/manufactures should take the first step towards securing portable devices with fool-proof security software before introducing them to the consumer marketplace.
Data security Analyst Jonathan Ladd agrees, a renowned specialist on data encryption and information security; he points out that, it’s not only smart phones that are a cause for concern, it’s also transportable storage devices such as movable hard-drives and flash drives (thumb drives). More often than not, folks unknowingly store their personal information on such devices. In some instances, people end up losing these devices with private data stored on them, and if those devices fall into the hands of criminals, they are likely to have their identity stolen. To make matters worse, the majority of the victims find out when it’s too late, and that their identity has already been used to conduct illegal activities. Ladd, emphasizes that anyone storing such data on compact drives should secure USB drives and compact hard-drives with third party data security software.
No comments:
Post a Comment