Securing your mobile life

Issue 9 2020 Editor's Choice

Smartphones and tablets have become normal accessories to most people, to the extent that it isn’t unusual for someone to have more than one device and/or SIM card for different purposes. And while the utility of these portable devices is immense, this normality has resulted in many people putting themselves at risk in their day-to-day use of these gadgets.

Ilonka Badenhorst, GM of the Wireless Application Service Providers’ Association (WASPA), explains that cybersecurity is not top of mind when people use their mobile devices. Some people have the misconception (as many do when using computers and laptops) that if they have an antivirus application on their system then all will be well.

In the mobile space, as in the general IT space, the biggest risk we face is the human factor. This applies to devices used for business as well as personal use. Badenhorst says most risky activity is a result of ignorance or carelessness. For example, loading any app that looks interesting and granting it all the permissions it asks for without asking why.

This is a sure way to find yourself infested with adware or spyware, at the very least. Users can also find themselves infected with malware that automatically attempts to infect their contacts, or ransomware that can encrypt their device until they pay a fee.

With billions of devices connected to the Internet, allowing unrestricted access to your gadgets is a recipe for disaster. Even smartwatches are connected to your phone and can be targeted, and smart home devices are just as vulnerable. Even an SMS can be risky as a message can be faked to look like a legitimate message from your bank or local tax authority.

Needless to say, if your device is also used for business, careless personal use can put your company at risk.

What to do?

Badenhorst explains that there are some simple, non-technical actions users can take to secure themselves. While not an exhaustive list, the following should be standard practice:

- Lock your devices with a password or PIN, and/or with the biometric options available. This will prevent unauthorised access.

- Download apps only from the official app stores. Moreover, even when getting an app from those stores, pay attention to the permissions. It’s quick and convenient to simply say yes to everything, but the risks are high. Ask why. Why does this app want access to your location or contacts? Is the permission necessary for the app to work?

- Take care when receiving messages that try to persuade you to click on a link. If the message tries to create an emotion, like excitement or fear (like an unauthorised login to your bank account), think twice. If you have to click on a link to log into your bank or SARS, type the link into your browser yourself rather than blindly following the link.

- When accessing a website, make sure it is the correct site and not a fake one designed to collect your login details and other personal information.

- Also ask why if you get a message on email or SMS that tries to get you to quickly do something to prevent something bad happening. For business people, if your boss requires you to do something in a rush, something out of the ordinary such as making a payment immediately, you can always call to confirm.

- Regularly check your bank account, credit card and mobile account statements for unusual deductions.

Stopping the spammers

Another frustration many have to deal with is SMS spam. This is legal, but annoying. If you want your number to be removed from the spammers’ contact lists, Badenhorst says you can go to the WASPA website (www.waspa.org.za). Most ethical companies are registered with WASPA and if you enter your number on the ‘Do Not Contact’ list (https://dnc.org.za/), the spam will cease. If it doesn’t, you know the company concerned is not registered with WASPA, or if it is, you can contact the association and they will take it further.

The consumer support section of the WASPA website also allows consumers to contact the association and lodge a complaint (if a company is registered but does not respect the Do Not Connect request, for example). Other support is available at www.waspa.org.za/consumer-support/




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...
Private fire services becoming the norm?
Technews Publishing SMART Security Solutions Editor's Choice
As the infrastructure and service delivery in many of South Africa’s major cities decline, with a few, limited exceptions, more of the work that should be done by the state has fallen to private companies.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
SMART Estate Security Conference KZN 2025
Arteco Global Africa OneSpace Technologies SMART Security Solutions Technews Publishing Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
May 2025 saw the SMART Security Solutions team heading off to Durban for our annual Estate Security Conference, once again hosted at the Mount Edgecombe Country Club.

Read more...
Get the AI fundamentals right
Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
South African fire standards in a nutshell
Fire & Safety Editor's Choice Training & Education
The importance of compliant fire detection systems and proper fire protection cannot be overstated, especially for businesses. Statistics reveal that 44% of businesses fail to reopen after a fire.

Read more...
LidarVision for substation security
Fire & Safety Government and Parastatal (Industry) Editor's Choice
EG.D supplies electricity to 2,7 million people in the southern regions of the Czech Republic, on the borders of Austria and Germany. The company operates and maintains infrastructure, including power lines and high-voltage transformer substations.

Read more...
Standards for fire detection
Fire & Safety Associations Editor's Choice
In previous articles in the series on fire standards, Nick Collins discussed SANS 10400-T and SANS 10139. In this editorial, he continues with SANS 322 – Fire Detection and Alarm Systems for Hospitals.

Read more...
Wildfires: a growing global threat
Editor's Choice Fire & Safety
Regulatory challenges and litigation related to wildfire liabilities are on the rise, necessitating robust risk management strategies and well-documented wildfire management plans. Technological innovations are enhancing detection and suppression capabilities.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.