"Let your conscience be your guide"


The importance of mobile security according to BlackBerry

BlackBerry, represented by Pablo Kulevicius, director of mobile security for Latin America, took advantage of the framework of the CIO Summit, an event organized by the Ministry of Information Technology and Communications (MinTIC) and the Colombian Chamber of Information Technology and Telecommunications (CCIT), to hold a conference where the importance of protecting and protecting information in corporate environments was discussed.

In dialogues with El Espectador, the security expert explained that at this moment there are two types of cyber threats. In the first place, all the malicious codes (malware), viruses and cloned pages that previously existed in the computer format, are migrating to the mobile platform in order to access information that is now stored on smartphones such as personal data, contacts and even accounts. banking.

On the other hand, there are threats specifically prepared for the smartphone environment, “for example malicious programs that capture confirmations of bank transfers that arrive through text and send it to a hacker to use the information before reach the real recipient, “explained the manager. In the same way, there is malware hidden in mobile applications that force the user to accept invasive permissions before being installed and that manage to access the data stored in the device.

Nuncio Di Mare, BlackBerry Corporate Sales Manager commented during the conference that “about 1.65 million dollars costs companies a data filtering problem, approximately 94 dollars for each record that is lost, which can affect the name of a company, a brand and its reputation. ”

To combat this, Kulevicius explains that PGP Blackberry gives absolute control to the user of everything that is part of their data security and privacy. “At any time you can choose any application and change the permissions you have,” he said. Likewise, the mobiles manufactured by the company are added to the tendency to encrypt the data, messing them up by means of a mathematical algorithm and protecting them so that they are indecipherable for any invader. This process works with text messages, files, information in the cloud and even with calls.

Despite all the protection tools offered by different technology companies, Kulevicius stressed that the security of a mobile device is born in the use of passwords, which, he says, “are not as used as one would believe.”




 

 

 

New Counter

Hit Counter