Mobile Security: Now More Than Ever

Mobile Security: Now More Than Ever
This post was published on the now-closed HuffPost Contributor platform. Contributors control their own work and posted freely to our site. If you need to flag this entry as abusive, send us an email.

Whenever I send a confidential email or text message on my smartphone, I do so with a large degree of hesitancy.

I have a sense of anxiety and foreboding because too few companies show too little interest involving mobile security. Rather, the security these firms provide is often anything but: A series of patchwork programs – picture the electronic equivalent of duct tape, which someone uses (in vain) to stop a breach in the hull of a ship – that cannot prevent a potentially devastating flood.

According to Georgia Weidman, Founder and CTO of Shevirah, a leading provider of mobile security solutions for smartphones, tablets, wearables and the Internet of Things.:

"The status quo is unacceptable because its offerings are, mostly, irrelevant. We need social engineering test software that addresses the way companies – and their respective employees – do business on their individual devices, particularly through social media. Penetration testing is key to achieving this goal. It requires a full review of all hardware, including smartphones and tablets. Without those actions, the vulnerabilities are too great and the weaknesses are too obvious for us to suspend disbelief; for us to think bad actors will not try to violate mobile security.”

Miss Weidman's advice is sound – and timely – because it speaks to the necessities of an environment overrun by mobile theft, cyber attacks and criminal activity in general. It gives voice to an issue we must resolve with speed and effectiveness. It is a call for unity – and purpose – amidst the otherwise overwhelming power of the Web.

The choice before us is unambiguous.

The plan we adopt must be unequivocal.

The results we accomplish must be undeniable.

(Disclaimer: I am not an employee of, an investor in or a consultant to any company referenced in this piece. I maintain a strict code of professional independence, free of any conflicts of interest.)

Popular in the Community

Close

What's Hot