As I have discussed in previous columns, the technology is moving so fast and upgrading with such incredible speed that it is hard to keep up with it and this is not going to change.It should also be very clear that with each new device thrust onto the market, there are new abilities and applications that the devices can perform as well.
Now when it comes to a cellphone, if you look at the number of them that exist and the features and abilities they contain, the “perks” if you will, it stands to reason that the once free from attack cellphone is now open to being invaded with viruses and other naughty illnesses, just like your PC and Laptop.
You see, all of the new features and abilities that are in cellphones are the result of new algorithms, which in mathematics and computer science is an effective method expressed as a finite list of well-articulated instructions for calculating a function.
Algorithms are used for calculation, data processing and automated reasoning of all processes that are performed by and within your cellphone.
With all of the new phone technology to include information technology in general, there is a basic rule of thumb that should be followed: Do not blindly believe in the effectiveness of new algorithms that are finding their way into phones, simply because they have not been tested beyond a certain point in the actual environment we call everyday life.
In short, guard well your personal information when putting it into your phone and don’t be misled by the excitement of having a great new gadget that is loaded with new features and applications, because there may be hidden weaknesses and vulnerabilities that your phone will fall prey to, creating untold problems in your life.
Another highly ignored aspect of cellphone ownership is the fact that they are more compact and therefore easier to lose or to have stolen.
In this regard, it is important to make sure your phone is password protected and that the password you use is both complex and easy for you to remember.
You see, in having the phone password protected, you will ensure that whoever finds it or takes it will only have the hardware and not the information contained within it.
Did I just hear someone ask the question, “What about big brother?”
Great question! Well, just remember that when you’re making a call from your phone, that causes your phone to initiate the process of finding a local tower to establish the wireless connection needed to make the call happen.
Once this process is in place, it is easy for organizations that we all know of and usually have three letters in their names to become aware of your movements and, in many cases, even listen in on your conversations.
If you doubt this, just think about the obvious situation of calling 9-1-1 and the fact that if you are unable to give them your actual, physical coordinates, they can, by way of a triangulation process that involves the towers to include your phone’s built-in GPS, pinpoint your location.
You should also remember the past governmental involvement in tapping into the phones of U.S. citizens that were suspected of having possible ties to terrorist groups and listening to their ongoing conversations.
Now this should not be unsettling to you unless you’re doing something or involved in something that puts you on the radar of those security agencies that I spoke of earlier.
Next week we’ll look at the final array of issues that you should be aware of when dealing with your phone’s security and the information contained within it.
Oh, and by the way, I really hope that you’re not wrapping your head and phone with aluminum foil to keep the hackers out; but if you are, please send me a picture and I promise not to put it on Facebook.
Andino Ward is vice president of marketing and operations of Bardissi Enterprises in Hatfield. Bardissi Enterprises welcomes your questions or comments. Questions you would like answered or topics you would like discussed should be sent to Andino R. Ward at award@bardissi.net. You can also visit www.bardissi.net, or call (215) 853-2266.
No comments:
Post a Comment