Encrypted: The Personal Side to Cybersecurity

Hackers are gaining access to mobile devices regardless of users clicking on a link. This leads to the question: People are asking these days: are my devices safe, are the apps I’m downloading secure, and how can I protect myself and my data?

Christopher Novak, the Global Director for the Threat Research Advisory Center with Verizon, provided some thoughts and insights on these concerns and provided some tips and best practices on what people should be doing to keep their mobile devices secure.

“From a security standpoint, we are always looking for there to be a hack or attack kind of angle for just about everything,” Novak said. “So naturally, when these big outages occur (like the recent outage at Facebook), they attract a lot of attention.” And while the current information on hand points to an internal issue, and not a cyberattack that brought Facebook down on October 4th, it raises the concern of many people about the safety of their data.

And these security concerns weren’t helped by the recent Apple malware attack called CVE-2021-30860, which could operate undetected to the user and potentially grab personal data. And While not every cyberattack is something a device user can protect themselves against, Novak said some best practices could safeguard many security risks.

“A couple of things that immediately come to mind,” Novak noted. “Number one: avoid rooting your device.” Sometimes called ‘jailbreaking,’ a user breaks out of some of the manufacturer’s core settings to do different things with the device; however, this can cause security failures built into the device’s core settings.

“Another one I always recommend is multi-factor identification. This way, if someone does get access to some of your information, or they learn your password, that’s not enough for them to get into your accounts or your devices.”

View Verizon Business’ Resources for more helpful and engaging content.

Follow us on social media for the latest updates in B2B!

Image

Latest

Women's empowerment
Seizing the Narrative: The Transformative Impact of Storytelling on Women’s Empowerment
April 19, 2024

With gender equality becoming a significant global agenda, the narrative around women’s empowerment is more relevant than ever. Amid rising awareness and shifting societal norms, women are increasingly seeking avenues for self-expression and empowerment. A recent study by the Global Gender Gap Report highlights that while progress is being made, substantial efforts are still […]

Read More
V2G technology
Plug into the Future: Decoding V2G for Utility Applications
April 19, 2024

Brian Rudy from Verizon IoT and Melissa Chan of Fermata Energy explore the cutting-edge potential of vehicle-to-grid (V2G) technology at DISTRIBUTECH 2024. Their discussion highlights how this innovation transforms electric vehicles into dynamic energy storage units, capable of stabilizing the grid by storing and discharging power as needed. This technology represents a significant shift […]

Read More
zero trust architecture
Secure Grid Modernization with Zero Trust Architecture
April 19, 2024

Ray Bauer of Verizon Business engages with Del Rodriguez from Palo Alto Networks at DISTRIBUTECH 2024. Rodriguez shares insights into the significance of cybersecurity within the utility sector, particularly in light of increasing cyber threats and the convergence of IT and operational technology (OT). Bauer and Rodriguez discuss Palo Alto Networks’ initiatives to enhance […]

Read More
private wireless networks
Private Wireless Networks
April 19, 2024

Verizon host Wayne Weeks discusses the evolving utility industry with John Gaster, CEO of KSI Data Sciences at DISTRIBUTECH 2024. Together, they explore how KSI focuses on harnessing data from remote sensing devices to enhance the safety, efficiency, and cost-effectiveness of utility operations. Gaster emphasizes the significant role of AI and machine learning in […]

Read More