Connect with us

Featured

Why cyber criminals love your smartphone

Published

on

Smartphones have become a central part of our lives. But, while they aim to heighten convenience, there is a real feeling that smartphones are becoming a bigger target for cybercriminals, says CAREY VAN VLAANDEREN, ESET South Africa CEO.

So, why are criminals eager to get into our devices?

A smartphone knows everything about us

The amount of information stored on a smartphone has skyrocketed in recent years.  The connectivity of apps means we supply nearly every piece of information about ourselves, whether its bank account details or our preferred taste in pizza.

For a cybercriminal potentially wanting to commit identity theft, a smartphone is a goldmine.

It’s a way into companies and other organisations

The use of Bring Your Own Device (BYOD) has become one of the most prominent trends for companies around the globe. Cybercriminals are viewing these devices as an ideal gateway into stealing valuable corporate information.

Security can be lax

The rise of BYOD has also caused plenty of headaches for a number of companies in various industries, mainly due to difficulties in rolling out a unified approach to security.

In a recent Tech Pro Research survey of CIOs, tech executives and IT workers, 45% of respondents said mobile devices posed the greatest risk to a company’s infrastructure, with the fragmented nature of some mobile platforms cited as a primary reason.

Autofill has become our best friend

One of the reasons our phones are carrying more personal information than ever before is primarily down to our desire for convenience.

With our devices now handling a myriad of services and subsequent apps, we find ourselves with a larger number login details than ever before.

It’s a route into your wallet

Our phones can be used to transfer money, pay our bills, and are even being used as a method of payment.

Apps such as SnapScan and FlickPay are pushing mobile payments into the  mainstream, and some experts expect it to be a trend that will continue over the next few years.

Of course, the only drawback is that they are likely to catch the attention of cybercriminals.

Phones know where you are and where you are work

In many circumstances, the reason behind tracking your device are entirely innocent, such as helping you get the most out of your data and your apps.

For example, if you’re out and about, you can check out restaurant or business recommendations with just a couple of swipes.

However, hacking a device’s GPS capabilities is not seen as a difficult task, with many gamers using it to cheat at the popular augmented reality game Pokémon Go in the hands of the criminals, a compromised GPS could be an unnerving prospect.

Bluetooth

For several years now, Bluetooth has been a regular feature on smartphones and other mobile devices. Yet, like GPS, it is still seen as a potential entry point for cybercriminals.

The effects of such an attack can result in Bluesnarfing – where a phone’s private information is compromised, or Bluebugging, which allows a criminal to take complete control of your phone.

But while there is a risk, these methods are becoming increasingly harder for hackers to exploit.

Some scams are specific to mobile

There are several well-known ways in which cybercriminals can use your smartphones to make quick cash.

In countries like China, for example, malware can be used to access devices and force them to call premium numbers that charge large amounts.

These scams are not only potentially lucrative, but can also spread across large numbers of devices.

They’re a great way of sending spam

Everyone hates spam. Well, apart from cybercriminals, anyway.

There are several reasons why a criminal would want to send spam, but many of them see smartphones as the ideal platform for sending these communications.

This is mainly because it is much harder for service providers to track down and block offenders.

Users are ignorant about the dangers

Many of the most seasoned tech users are now well acquainted with best practices when it comes to using laptops or desktops, but smartphones often slip down the list of priorities.

Which, in some ways is surprising, given that smartphones have increasingly been targeted since as early as 2005.

However, as the threat is more visible than ever, we’re slowly beginning to understand that security matters. Let’s treat them with the importance they deserve.

Featured

IoT at starting gate

South Africa is already past the Internet of Things (IoT) hype cycle and well into the mainstream, writes MARK WALKER, associate vice president of Sub-Saharan Africa at International Data Corporation (IDC).

Published

on

Projects and pilots are already becoming a commercial reality, tying neatly into the 2017 IDC prediction that 2018 would be the year when the local market took IoT mainstream. Over the next 12-18 months, it is anticipated that IoT implementations will continue to rise in both scope and popularity. Already 23% are in full deployment with 39% in the pilot phase. The value of IoT has been systematically proven and yet its reputation remains tenuous – more than 5% of companies are reluctant to put their money where the trend is – thanks to the shifting sands of IoT perception and success rate.

There are several reasons behind why IoT implementations are failing. The biggest is that organisations don’t know where to start. They know that IoT is something they can harness today and that it can be used to shift outdated modalities and operations. They are aware of the benefits and the case studies. What they don’t know is how to apply this knowledge to their own journey so their IoT story isn’t one of overbearing complexity and rising costs.

Another stumbling block is perception. Yes, there is the futuristic potential with the talking fridge and intelligent desk, but this is not where the real value lies. Organisations are overlooking the challenges that can be solved by realistic IoT, the banal and the boring solutions that leverage systems to deliver on business priorities. IoT’s potential sits within its ability to get the best out of assets and production efficiencies, solving problems in automation, security, and environment.

In addition to this, there is a lack of clarity around return on investment, uncertainty around the benefits, a lack of executive leadership, and concerns around security and the complexities of regulation.  Because IoT is an emerging technology there remains a limited awareness of the true extent of its value proposition and yet 66% of organisations are confident that this value exists.

This percentage poses both a problem and opportunity. On one hand, it showcases the local shift in thinking towards IoT as a technology worth investing into. On the other hand, many companies are seeing the competition invest and leaping blindly in the wrong direction. Stop. IoT is not the same for every business.

It is essential that every company makes its own case for IoT based on its needs and outcomes. Does agriculture have the same challenges as mining? Does one mining company have the same challenges as another? The answer is no. Organisations that want their IoT investment to succeed must reject the idea that they can pick up where another has left off. IoT must be relevant to the business outcome that it needs to achieve. While some use cases may apply to most industries based on specific circumstances, there are different realities and priorities that will demand a different approach and starting point.

Ask – what is the business problem right now and how can technology be leveraged to resolve it?

In the agriculture space, there is a need to improve crop yields and livestock management, improve farm productivity and implement environmental monitoring. In the construction and mining industry, safety and emergency response are a priority alongside workforce and production management. Education shifts the lens towards improving delivery and quality of education, access to advanced learning methods and reducing the costs of learning.  Smart cities want to improve traffic and efficiently deliver public services and healthcare is focusing on wellness, reducing hospital admissions and the security of assets and inventory management.

The technology and solutions selected must speak to these specific challenges.

If there are no insights used to create an IoT solution, it’s the equivalent of having the fastest Ferrari on Rivonia Road in peak traffic. It makes a fantastic noise, but it isn’t going to move any faster than the broken-down sedan in the next lane. Everyone will be impressed with the Ferrari, but the amount of power and the size of the investment mean nothing. It’s in the wrong place.

What differentiates the IoT successes is how a company leverages data to deliver meaningful value-added predictions and actions for personalised efficiencies, convenience, and improved industry processes. To move forward the organisation needs to focus on the business outcomes and not just the technology. They need to localise and adapt by applying context to the problem that’s being solved and explore innovation through partnerships and experimentation.

Continue Reading

Featured

ERP underpins food tracking

The food traceability market is expected to reach almost $20 billion by 2022 as increased consumer awareness, strict governance requirements, and advances in technology are resulting in growing standardisation of the segment, says STUART SCANLON, managing director of epic ERP

Published

on

Just like any data-driven environment, one of the biggest enablers of this is integrated enterprise resource planning (ERP) solutions.

As the name suggests, traceability is the ability to track something through all stages of production, processing, and distribution. When it comes to the food industry, traceability must also enable stakeholders to identify the source of all food inputs that can include anything from raw materials, additives, ingredients, and packaging.

Considering the wealth of data that all these facets generate, it is hardly surprising that systems and processes need to be put in place to manage, analyse, and provide actionable insights. With traceability enabling corrective measures to be taken (think product recalls), having an efficient system is often the difference between life or death when it comes to public health risks.

Expansive solutions

Sceptics argue that traceability simply requires an extensive data warehouse to be done correctly, the reality is quite different. Yes, there are standard data records to be managed, but the real value lies in how all these components are tied together.

ERP provides the digital glue to enable this. With each stakeholder audience requiring different aspects of traceability (and compliance), it is essential for the producer, distributor, and every other organisation in the supply chain, to manage this effectively in a standardised manner.

With so many different companies involved in the food cycle, many using their own, proprietary systems, just consider the complexity of trying to manage traceability. Organisations must not only contend with local challenges, but global ones as well as the import and export of food are big business drivers.

So, even though traceability is vital to keep track of everything in this complex cycle, it is also imperative to monitor the ingredients and factories where items are produced. Having expansive solutions that must track the entire process from ‘cradle to grave’ is an imperative. Not only is this vital from a safety perspective, but from cost and reputational management aspects as well. Just think of the recent listeriosis issue in South Africa and the impact it has had on all parties in that supply chain.

Efficiency improvements

Thanks to the increasing digital transformation efforts by companies in the food industry, traceability becomes a more effective process. It is no longer a case of using on-premise solutions that can be compromised but having hosted ones that provide more effective fail-safes.

In a market segment that requires strict compliance and regulatory requirements to be met, cloud-based solutions can provide everyone in the supply chain with a more secure (and tamper-resistant) solution than many of the legacy approaches of old.

This is not to say ERP requires the one or the other. Instead, there needs to be a transition provided between the two scenarios that empowers those in the food supply chain to maximise the insights (and benefits) derived from traceability.

Now, more than ever, traceability is a business priority. Having the correct foundation through effective ERP is essential if a business can manage its growth and meet legislative requirements into the future.

Continue Reading

Trending

Copyright © 2018 World Wide Worx