Pages

Saturday 24 November 2012

Computer Security vs. Smartphone Security

By Allyson Westcot


Many business people won't go anywhere without their smartphones, and often have a number of apps on their device that require usernames and passwords. Unfortunately, a digital security firm has found that 3/4 of these apps don't encrypt data securely well enough, or at all, to protect these things adequately.

If you use your smartphone to login at any website, the only piece of your data that's protected might be your password. Your username might not be protected, so anyone monitoring you can grab it. That's one less number or word they have to figure out before they can gain complete access into whatever you're using. Passwords aren't even protected in some apps.. If your smartphone stores usernames, passwords or even credit card information, that information might be sitting there just waiting for the hacker who knows how to get into your programs.

A rugged laptop, on the other hand, can be as protected as you choose. You can generally purchase built-in security ranging from spyware and virus protection to things like biometric access. A good firewall, anti-virus protection and heavy encryption should be enough for most people.

LinkedIn is a business social site where people make networking contacts and list their business information. Unfortunately, along with sites and applications like WordPress and Skype, your login data isn't protected when you login with a smartphone. Yahoo Mail, Gmail and Netflix are also very well-used sites that don't keep your information protected enough when logged in through a phone.

Some users may also find that their banking information isn't that secure via phone. Facebook, Amazon, Twitter and other wildly popular sites also keep some information without protection if you access them through a phone. Why rely on a phone that has a small chance of being secure enough when you could use a computer with lots of security? Using a computer is an ideal choice for using websites that might not protect your information.




About the Author:



0 comments:

Post a Comment