Securing your mobile life

Issue 9 2020 Editor's Choice

Smartphones and tablets have become normal accessories to most people, to the extent that it isn’t unusual for someone to have more than one device and/or SIM card for different purposes. And while the utility of these portable devices is immense, this normality has resulted in many people putting themselves at risk in their day-to-day use of these gadgets.

Ilonka Badenhorst, GM of the Wireless Application Service Providers’ Association (WASPA), explains that cybersecurity is not top of mind when people use their mobile devices. Some people have the misconception (as many do when using computers and laptops) that if they have an antivirus application on their system then all will be well.

In the mobile space, as in the general IT space, the biggest risk we face is the human factor. This applies to devices used for business as well as personal use. Badenhorst says most risky activity is a result of ignorance or carelessness. For example, loading any app that looks interesting and granting it all the permissions it asks for without asking why.

This is a sure way to find yourself infested with adware or spyware, at the very least. Users can also find themselves infected with malware that automatically attempts to infect their contacts, or ransomware that can encrypt their device until they pay a fee.

With billions of devices connected to the Internet, allowing unrestricted access to your gadgets is a recipe for disaster. Even smartwatches are connected to your phone and can be targeted, and smart home devices are just as vulnerable. Even an SMS can be risky as a message can be faked to look like a legitimate message from your bank or local tax authority.

Needless to say, if your device is also used for business, careless personal use can put your company at risk.

What to do?

Badenhorst explains that there are some simple, non-technical actions users can take to secure themselves. While not an exhaustive list, the following should be standard practice:

- Lock your devices with a password or PIN, and/or with the biometric options available. This will prevent unauthorised access.

- Download apps only from the official app stores. Moreover, even when getting an app from those stores, pay attention to the permissions. It’s quick and convenient to simply say yes to everything, but the risks are high. Ask why. Why does this app want access to your location or contacts? Is the permission necessary for the app to work?

- Take care when receiving messages that try to persuade you to click on a link. If the message tries to create an emotion, like excitement or fear (like an unauthorised login to your bank account), think twice. If you have to click on a link to log into your bank or SARS, type the link into your browser yourself rather than blindly following the link.

- When accessing a website, make sure it is the correct site and not a fake one designed to collect your login details and other personal information.

- Also ask why if you get a message on email or SMS that tries to get you to quickly do something to prevent something bad happening. For business people, if your boss requires you to do something in a rush, something out of the ordinary such as making a payment immediately, you can always call to confirm.

- Regularly check your bank account, credit card and mobile account statements for unusual deductions.

Stopping the spammers

Another frustration many have to deal with is SMS spam. This is legal, but annoying. If you want your number to be removed from the spammers’ contact lists, Badenhorst says you can go to the WASPA website (www.waspa.org.za). Most ethical companies are registered with WASPA and if you enter your number on the ‘Do Not Contact’ list (https://dnc.org.za/), the spam will cease. If it doesn’t, you know the company concerned is not registered with WASPA, or if it is, you can contact the association and they will take it further.

The consumer support section of the WASPA website also allows consumers to contact the association and lodge a complaint (if a company is registered but does not respect the Do Not Connect request, for example). Other support is available at www.waspa.org.za/consumer-support/




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
How AI video is reshaping real estate security
neaMetrics TRASSIR - neaMetrics Distribution Editor's Choice
Globally, property maintenance and facility operations spending is projected to grow to over US$145 billion by 2034, reflecting rising complexity, compliance pressures, and increased exposure to operational costs. AI systems can protect properties, automate access, and optimise building management.

Read more...
Open systems support hybrid surveillance
SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice
Today, end users can select the most suitable surveillance solution for their needs, whether it is on-site, at the edge, or in the cloud; a hybrid approach combining different options is most effective depending on the scenario.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.