Reply To: OCU C)OST B Discussion Lesson 10
Mobile devices have vulnerabilities that can allow hackers access to sensitive information. Improper credential usage is a vulnerability that leaves user data accessible. This occurs when credentials are used incorrectly or are hardcoded. (Asee 2023) insufficient input and output validation is a vulnerability that does not validate data input from outside sources. When the incoming data is not validated, hackers can access sensitive data. Another vulnerability mobile devices face is inadequate privacy control. Inadequate privacy control correlates closely with personal identifiable information (PII). If users PII is leaked it leaves devices vulnerable to attacks. If hackers can access a person’s financial information this could result in unauthorized transactions that could be financially devastating. Ways to prevent these types of attacks are by keeping your mobile device updated, adding more security authentication.
Physical hardware is also susceptible to vulnerability. Outdated device firmware can lead to being plagued by bugs and security flaws. Wright (2023) Lack of encryption can also lead to attacks on physical hardware. When an organization grows it can sometimes add innovative technology that does not have a strong encryption. This leaves companies vulnerable to attacks. A way to prevent these types of vulnerability is to ensure you buy hardware from a reputable vendor, enforcing access control areas where hardware is placed, and adding weekly vulnerability scanning. Wright (2023)
Wright, K. (2023, January 13). Top 10 hardware vulnerabilities MSPs should watch out for. inSOC. https://in-soc.com/blog/top-10-hardware-vulnerabilities-msps-should-watch-out-for/