2. INTRODUCTION
• Mobile devices have become man’s new best
friend.
• If you don’t believe it, 4 billion mobile phones in
use worldwide among 7 billion people.
• our devices to stay in touch, take pictures, shop,
bank, listen to music, and socialize.
• We store personal and professional information
on them.
• It has high financial and emotional value.
3. Mobile is everywhere
Mobile is about transacting
1
96% year to year increase in mobile cyber Monday sales between 2012 and 2011
Mobile enables the Internet of Things
2
4
3
Mobile is primary
5
90% of users use multiple screens as channels come together to create integrated
experiences
Mobile must create a continuous brand experience
Global Machine-to-machine connections will increase from 2 billion in 2011 to 18
billion at the end of 2022
Insights from mobile data provide new opportunities
75% of mobile shoppers take action after receiving a location based messages2
1 91% of mobile users keep their device within arm’s reach 100% of the time
Mobile is primary
4. Mobile Threats and Consequences
Device loss or theft
• Loss of sensitive personal and
employer information such as
contacts, calendars and
photos
• Breach of your privacy, and in
a worst-case scenario, you
could become a victim of
identity theft
5. phishing scams (often
delivered via emails, texts
and social networking sites)
• Sensitive information revealed
such as account numbers and
login credentials
• Unauthorized withdrawals
made from your bank account
6. Malware and spyware
• Compromised personal
information—you could
even become a victim of
identity theft
• Unauthorized charges
could appear on your
mobile bill
• Others may listen in on
your phone calls and
retrieve your voicemails
7. Quick Response (QR)
codes
• You could accidentally
download a malicious
application
• Your personal
information could be
compromised, or your
device could cease to
function properly
8. Wi-Fi networks
• You could connect to an
unsecured network, and
the data you send,
including sensitive
information such as
passwords and account
numbers, could
potentially be intercepted
9. Broken Cryptography
• broken cryptography
can happen when app
developers use weak
encryption algorithms,
or strong encryption
without proper
implementation
10. Network Spoofing
• Network spoofing is when
hackers set up fake access
points (connections that look
like Wi-Fi networks but are
actually traps) in high-traffic
public locations such as
coffee shops, libraries and
airports.
cybercriminals give the
access points common
names, like “Free Airport Wi-
Fi” or “Coffeehouse,” which
encourage users to connect.
12. • Lock your device with a personal identification
number (PIN) or password
• Only install applications (apps) from trusted
sources
• Back up your data
• Keep your system updated
• Don’t hack your device
• Always log out of banking and shopping sites
• Turn off Wi-Fi, location services, and
Bluetooth when they are not in use
13. • Avoid texting or emailing personal
information
• Don’t click on links or attachments in
unsolicited emails or text messages
• Install a mobile security app