Mobile Security with Ericson Bello
Ericson Bello
Product Designer | Tailor | Shoemaker | Student of the Mind & Behaviour | Fitness & Wellness Teacher | DQ Advocate | Audio, Video, Technical Expert | Muser | Budding Executive Assistant
Teaching Outline:
Introduction
Statistics
Definition
Security Concerns
Why is mobile device security important?
Mobile Security Threats
How to Protect Your Devices from threats
Conclusion
Mobile Security with Ericson Bello
Introduction:
What if I tell you there is nothing private or invincible once you're connected to or it is shared on the internet. You also need to know that cyber-attack is always on the rise.
I know this is ringing a bell in your mind.
You don't need to be scared because, there is always a way out.
Today, I will be discussing 'Mobile Security'
Before I go into the Topic properly, I want you to go through some Statistics.
Statistics:
Cyber Security Statistics (Editor’s Choice)
Cyber-attacks occur 2,244 times per day.
92% of malware is delivered using email.
By 2023, the global cybersecurity market will be worth $248.26 billion.
71% of breaches are financially motivated.
43% of all data breaches involve small businesses.
95% of data breaches come from 3 industries.
64% of Americans have never checked whether they have suffered a breach.
General Cyber Security Stats & Facts
1. 4.1 billion records were exposed due to data breaches in the first 6 months of 2019.
During the first half of 2019, around 3,800 cyber-attacks that led to a data breach were reported. The majority of the 4.1 billion exposed records, or around 3.2 billion, were exposed in just 8 of these events. Emails were exposed in 70% of the cases, while passwords were leaked in 65% of the breaches.
(Forbes)
2. 52% of data breaches involve hacking.
Cyber security attacks statistics show that 32-33% of all attacks include phishing or social engineering, while 28% involve malware. Additionally, 21% of all data breaches are caused by an error, while 15% have an authorized user’s mistake as the culprit. The majority of data invasions, however, involve some form of hacking.
(Verizon)
3. Cyber-attacks occur 2,244 times per day.
According to a study by the University of Maryland, a cyber-attack occurs once every 39 seconds. Cyber-attack statistics derived from the study indicate that the most commonly attempted username was “admin”. The most commonly attempted password was the same word, and it was used in 43% of all hacking attempts.
(University of Maryland)
4. 92% of malware is delivered using email.
Email and phishing attacks are still how most cybercrimes take place. 56% of 1,300 surveyed IT security experts agree that phishing prevention is their top priority. Data breach statistics suggest that, with 92% of malware delivered over email, it might be the time to consider some of the top email spam filtering companies on the market.
(CSO)
5. 37% of malicious email attachments are .doc and .dot files.
One of the cyber security facts that haven’t changed over the years is that attachments remain one of the most commonly used ways of getting into the targets’ system. More than a third of all malicious email attachments are hidden behind a .doc or .dot file. The next most common type, present in 19.5% of the cases, are .exe files. Teaching those with access to sensitive files to not open suspicious emails and attachments is key for data breach prevention, whereas email encryption software can add an additional layer of security.
(Symantec)
Cyber Security Industry Trends
6. Global cybersecurity spending is expected to reach $133.7 billion by 2022.
Cyber threats are a growing concern in the digital world. Globally, we’re spending 141% more now on cybersecurity than we did in 2010. A couple of years from now, the amount that companies spend to keep their users’ data safe will climb to $133.7 billion, cyber security trends indicate.
(RSAConference)
7. By 2023, the global cybersecurity market will be worth $248.26 billion.
Cybersecurity is definitely one of today’s most lucrative industries. With the increase of global spending, the number of companies that operate in this field is poised to increase. You can take a look at the best cyber security firms that have already made a name for themselves in this business.
(Statista)
8. The European cybersecurity market was worth $36.02 billion in 2019.
Emerging trends in cyber security indicate that Europe is expected to be the region with the highest Compound Annual Growth Rate in the next 5 years when it comes to this particular industry. By 2025, the European cybersecurity market is expected to exceed $65 billion in value.
(Fortune Business Insights)
9. 68% of business leaders believe their cybersecurity risks are increasing.
Recent cyber-crime statistics should be a cause for concern for businesses around the world. Close to 80% of businesses are implementing new digital technologies into their operations much faster than they’re able to secure those technologies against attacks.
(Accenture)
10. 95% of data breaches come from 3 industries.
While all industries are susceptible to cyber security breaches, there are 3 sectors that account for the majority of all breaches — government, retail, and technology. These industries are commonly targeted because their databases are the most likely to contain personal information.
(Cybint)
11. 45% of organizations encrypt the data on-premise prior to sending it to the cloud.
According to the NCipher study, the main driver for data encryption is to protect customer personal information. Nearly half of the organizations use keys they generate and manage to perform encryption. On the other hand, 36% of the organization performs encryption in the cloud with keys generated by the cloud provider.
(NCipher)
More Facts about Cyber Security
12. 71% of breaches are financially motivated.
The reasons behind these attacks can be numerous. However, the majority of them are driven by financial motives. The second most common reason is espionage, accounting for 25% of data breaches.
(Infosec)
13. 43% of all data breaches involve small businesses.
Small business owners who feel they are not likely to be affected by cyber security incidents would be horribly wrong. Small business cyber security statistics show that 43% of all data breaches involve small businesses.
(Packetlabs)
14. It took an average of 206 days to detect a breach in 2019.
Discovering a data breach can be more difficult than remedying the effects of one. In 2019, the average time it took businesses to detect a data breach was close to 7 months. Organizations meanwhile needed an average of 73 days to contain a breach.
(All About Security)
15. The average total cost of a data breach is $3.92 million.
During the last 5 years, the cost of the average data breach has increased by more than 12%, cyber security facts show. With the average breach exposing 25,575 records, the cost of repairing the damages can be quite severe. Some organizations, such as Capital One, had data breaches that cost them over $100 million.
(IBM)
16. The global cybercrime economy brings in $1.5 trillion per year.
Why are these attacks so popular? Because they can pay off massively. During 2018, a study came out with this stunning figure: the cybercrime industry brings in $1.5 trillion in yearly profits. Where does that money come from?
$860 billion comes from illegal online markets.
$500 billion comes from the theft of trade secrets.
$160 billion comes from data trading.
$1.6 billion comes from crimeware-as-a-service.
$1 billion comes from ransomware.
(hashedout)
Hacking Statistics
17. The Yahoo data breach exposed 3 billion accounts in 2013.
In 2013, a major Internet attack took place. Yahoo had all of its user’s data exposed in this breach, which is, to date, the largest data breach in history. At least among the ones we know about.
(NY Times)
18. The Uber data breach exposed personal info of 57 million users in 2016.
Just 3 years after Yahoo, Uber had a similarly unpleasant experience. Hackers accessed a third-party cloud storage service that the company used and downloaded personal information on 57 million Uber users (names, email addresses, phone numbers). Uber’s cyber security facts released after the event listed that 600,000 of those were drivers, with information including their driver’s license numbers. To keep them quiet about the incident, Uber reportedly paid the hackers $100,000. This damage control tactic, obviously, didn’t work.
(Uber)
19. A FriendFinder data breach exposed 412 million accounts in 2017.
During the 20 years it was on the market, FriendFinder Networks Inc. managed to spread out into various fields such as online dating, sex-chat, and pornography, gathering the data on hundreds of millions of individuals. When 5 of their websites were hacked in 2017, data from over 412 million users was stolen, cyber security breach statistics show.
(The Wall Street Journal)
20. An Equifax data breach exposed the details of 147.9 million users.
One of the most notorious hackings also took place in 2017. Equifax, the now infamous credit bureau, got hacked and the data of 147.9 million of their users was stolen. What made this breach so well-known is how much it cost the company; estimates show that Equifax has lost around $4 billion so far due to this unfortunate event.
(Equifax)
21. 64% of Americans have never checked whether they have suffered a breach.
Even though it takes around 3 minutes to do so, cyber security statistics find that more than two-thirds of Americans have never bothered to check whether they have been affected by a data breach. The percentage of those who wouldn’t know what to do after being exposed to a data breach is the same, at 64%. Even after discovering a recent data breach, 56% of Americans wouldn’t know what to do.
(Varonis)
Interesting Facts about Cyber Security
22. 1 in 36 mobile devices has high-security risk apps.
Being mindful of what we download and access is also important when we’re on our phones. while 1 in 36 devices with potentially harmful apps installed doesn’t sound too bad, we should keep in mind that 10,553 malicious mobile apps are blocked every day.
(CTMfile)
23. The average ransomware attack costs businesses $133,000.
Cyber security facts and figures show that businesses that fell a victim of a ransom attack in the past lost an average of $133,000 due to the event. This figure includes the ransom, along with other losses that the business suffered as a result of the attack.
(Gigabit)
24. 1 in 13 web searches leads to malware.
Every 13th web request takes Internet users to a malicious website. Cyber security threats statistics show that 60% of these websites are related to spam campaigns, while 20% are new and used for around a week.
(Symantec)
25. 53% of organizations have more than 1,000 sensitive files open for all employees.
Keeping in mind that 34% of data breaches involve insiders, granting access to sensitive information to all employees might be a bad idea. To make things even worse, around 22% of all folders that an average company keeps are open to all employees. The average employee has access to 17 million files.
(Varonis)
26. 82% of employers find that there is a shortage of qualified cybersecurity workers.
Cyber security jobs statistics show that there is a shortage of skilled workers in this field. There are currently 1 million unfilled positions in cybersecurity, and no available workers. The situation isn’t likely to improve before 2021, when 100% of large organizations are expected to open positions in this field. For those wondering what field to get into, cybersecurity, with its 0% unemployment rate, might be the answer.
(CSIS)
Source: 99firms
More Statistics:
11 Impactful Cybersecurity Facts and Stats
The worldwide information security market is forecast to reach $170.4 billion in 2022. (Gartner)
62% of businesses experienced phishing and social engineering attacks in 2018. (Cybint Solutions)
68% of business leaders feel their cybersecurity risks are increasing. (Accenture)
Only 5% of companies’ folders are properly protected, on average. (Varonis)
Data breaches exposed 4.1 billion records in the first half of 2019. (RiskBased)
71% of breaches were financially motivated and 25% were motivated by espionage. (Verizon)
52% of breaches featured hacking, 28% involved malware and 32–33% included phishing or social engineering, respectively. (Verizon)
Between January 1, 2005 and April 18, 2018 there have been 8,854 recorded breaches. (ID Theft Resource Center)
While overall ransomware infections were down 52%, enterprise infections were up by 12% in 2018. (Symantec)
The top malicious email attachment types are .doc and .dot which make up 37%, the next highest is .exe at 19.5%. (Symantec)
By 2020, the estimated number of passwords used by humans and machines worldwide will grow to 300 billion. (Cybersecurity Media)
Largest Data Breaches and Hacking Statistics
Security breaches have increased by 11% since 2018 and 67% since 2014. (Accenture)
Hackers attack every 39 seconds, on average 2,244 times a day. (University of Maryland)
The average time to identify a breach in 2019 was 206 days. (IBM)
The average lifecycle of a breach was 314 days (from the breach to containment). (IBM)
500 million consumers, dating back to 2014, had their information compromised in the Marriott-Starwood data breach made public in 2018. (Marriott)
64% of Americans have never checked to see if they were affected by a data breach. (Varonis)
56% of Americans don’t know what steps to take in the event of a data breach. (Varonis)
The average cost of a data breach is $3.92 million as of 2019. (Security Intelligence)
83% of enterprise workloads will move to the cloud by the year 2020. (Forbes)
In 2016, 3 billion Yahoo accounts were hacked in one of the biggest breaches of all time. (NY Times)
In 2016, Uber reported that hackers stole the information of over 57 million riders and drivers. (Uber)
Uber tried to pay off hackers to delete the stolen data of 57 million users and keep the breach quiet. (Bloomberg)
In 2017, 412 million user accounts were stolen from Friendfinder’s sites. (Wall Street Journal)
In 2017, 147.9 million consumers were affected by the Equifax Breach. (Equifax)
The Equifax breach cost the company over $4 billion in total. (Time Magazine)
In 2018, Under Armor reported that its “My Fitness Pal” was hacked, affecting 150 million users. (Under Armour)
18 Russians, 19 Chinese individuals, 11 Iranians and one North Korean were involved in indictments for their alleged state-sponsored espionage against the United States. (Symantec)
Cyber Crime Statistics by Attack Type
In the 2019 DBIR, 94% of malware was delivered by email. (Verizon)
Phishing levels declined, dropping from 1 in 2,995 emails in 2017, to 1 in 3,207 emails in 2018. (Symantec)
34% of data breaches involved internal actors. (Verizon)
51% of businesses experienced denial of service attacks in 2018. (Cybint Solutions)
61% of organizations have experienced an IoT security incident. (CSO Online)
Malicious PowerShell scripts blocked in 2018 on the endpoint increased 1,000%. (Symantec)
100,000 groups in at least 150 countries and more than 400,000 machines were infected by the Wannacry virus in 2017, at a total cost of around $4 billion. (Technology Inquirer)
IoT devices experience an average of 5,200 attacks per month. (Symantec)
90% of remote code execution attacks are associated with cryptomining. (CSO Online)
The average cost of a ransomware attack on businesses is $133,000. (SafeAtLast)
In a different sample, 92% of malware is delivered by email. (CSO Online)
48% of malicious email attachments are office files. (Symantec)
69% of organizations don’t believe the threats they’re seeing can be blocked by their anti-virus software. (Ponemon Institute’s Cost of Data Breach Study)
Gandcab 5 requires that victims pay $2,499 for the decryption key. (McAfee)
1 in 36 mobile devices had high risk apps installed. (Symantec)
In 2018, an average of 10,573 malicious mobile apps were blocked per day. (Symantec)
65% of groups used spear-phishing as the primary infection vector. (Symantec)
Mirai distributed denial of service (DDoS) worm remained an active threat and, with 16% of the attacks, was the third most common IoT threat in 2018. (Symantec)
1 in 13 web requests lead to malware. (Symantec)
Ransomware detections have been more dominant in countries with higher numbers of internet-connected populations. The United States ranks highest with 18.2% of all ransomware attacks. (Symantec)
Most malicious domains, about 60%, are associated with spam campaigns. (Cisco)
About 20% of malicious domains are very new and used around 1 week after they are registered. (Cisco)
Cybersecurity Compliance and Governance Statistics
69% of companies see compliance mandates driving spending. (CSO Online)
53% of companies had over 1,000 sensitive files open to every employee. (Varonis)
22% of all folders were available to every employee. (Varonis)
88% companies spent more than $1 million on preparing for the GDPR. (CSO Online)
Google was fined $57 billion for GDPR violations by CNIL, a French data protection agency. (TechCrunch)
Companies reportedly spent $9 billion on preparing for the GDPR. (Forbes)
By December 2018, only 50% of companies believed they were GDPR compliant. (Data Center Frontier)
15% of companies found 1,000,000+ files open to every employee. (Varonis)
17% of all sensitive files were accessible to all employees. (Varonis)
On average, every employee had access to 17 million files. (Varonis)
The GDPR fines totalled $63 million in its first year. (GDPR.eu)
1,000 news sources blocked EU readers to avoid the GDPR compliance rules. (Nieman Lab)
61% of companies have over 500 accounts with non-expiring passwords. (Varonis)
Businesses spent $1.3 million on average to meet compliance requirements and are expected to put in an additional $1.8 million. (IAAP)
Legal advice and teams cost UK FTSE 350 companies about 40% of their GDPR budget or $2.4 million. (Forbes)
Since the GDPR was enacted, 31% of consumers feel their overall experience with companies has improved. (Marketing Week)
In the GDPR’s first year, there were 144,000 complaints filed with various GDPR enforcement agencies and 89,000 data breaches recorded. (EDPB)
Equifax was found liable for their 2017 breach and was fined $425 million by the Federal Trade Commission (FTC) in 2019. (FTC)
Industry-Specific Cyber Stats
43% of breach victims were small businesses. (Verizon)
Financial and Manufacturing services have the highest percent of exposed sensitive files at 21%. (Varonis)
Financial services had 352,771 exposed sensitive files on average while Healthcare, Pharma and Biotech have 113,491 files on average — the highest when comparing industries. (Varonis)
15% of breaches involved Healthcare organizations, 10% in the Financial industry and 16% in the Public Sector. (Verizon)
The banking industry incurred the most cybercrime costs in 2018 at $18.3 million (Accenture)
Smaller organizations (1–250 employees) have the highest targeted malicious email rate at 1 in 323. (Symantec)
WannaCry ransomware attack cost the National Health Service (NHS) over $100 million. (Datto)
The estimated losses in 2019 for the healthcare industry are $25 billion. (SafeAtLast)
Lifestyle (15%), and Entertainment (7%) were the most frequently seen categories of malicious apps. (Symantec)
Supply chain attacks are up 78% in 2019. (Symantec)
Trojan horse virus Ramnit largely affected the financial sector in 2017, accounting for 53% of attacks. (Cisco)
The financial services industry takes in the highest cost from cybercrime at an average of $18.3 million per company surveyed. (Accenture)
The industry with the highest number of attacks by ransomware is the healthcare industry. Attacks will quadruple by 2020. (CSO Online)
Security Spending and Cost Statistics
By 2020, security services are expected to account for 50% of cybersecurity budgets. (Gartner)
The average cost of a malware attack on a company is $2.6 million. (Accenture)
$3.9 million is the average cost of a data breach. (IBM)
Healthcare had the highest data breach costs at $429 per record. (IBM)
The average cost per record stolen is $150. (IBM)
The total cost of cybercrime for each company increased by 12% from $11.7 million in 2017 to $13.0 million in 2018. (Accenture)
The average annual security spending per employee doubled, from $584 in 2012 to $1,178 in 2018. (Gartner)
The cost of lost business averaged $1.42 million. (IBM)
The average cost in time of a malware attack is 50 days. (Accenture)
The most expensive component of a cyber-attack is information loss at $5.9 million. (Accenture)
The average cost per lost or stolen records per individual is $141 — but that cost varies per country. Breaches are most expensive in the United States ($225) and Canada ($190). (Ponemon Institute’s Cost of Data Breach Study)
In companies with over 50k compromised records, the average cost of a data breach is $6.3 million. (Ponemon Institute’s Cost of Data Breach Study)
Including turnover of customers, increased customer acquisition activities, reputation losses and diminished goodwill, the cost of lost business globally was highest for U.S. companies at $4.13 million per company. (Ponemon Institute’s Cost of Data Breach Study)
Damage related to cybercrime is projected to hit $6 trillion annually by 2021. (Cybersecurity Ventures)
Ransomware damage costs will rise to $11.5 billion in 2019 and a business will fall victim to a ransomware attack every 14 seconds at that time. (Cybersecurity Ventures)
The United States and the Middle East spend the most on post-data breach response. Costs in the U.S. were $1.56 million and $1.43 million in the Middle East. (Ponemon Institute’s 2017 Cost of Data Breach Study)
50% of large enterprises (with over 10,000 employees) are spending $1 million or more annually on security, with 43% spending $250,000 to $999,999, and just 7% spending under $250,000. (Cisco)
Cybersecurity Job Statistics
82% of employers report a shortage of cybersecurity skills. (ISSA)
61% of companies think their cybersecurity applicants aren’t qualified. (ISSA)
The cybersecurity unemployment rate is 0% and is projected to remain there through 2021. (CSO Online)
It’s predicted that by 2021, 100% of large companies globally will have a CISO position. (Cybersecurity Ventures)
By 2021, it’s projected that there will be 3.5 million unfilled cybersecurity jobs globally. (Cybersecurity Ventures)
Information Security Analysts job positions in the US are expected to grow 32% from 2018–28. (Bureau of Labour Statistics)
Computer Network Architect job positions in the US are expected to grow 5% from 2018–28. (Bureau of Labour Statistics)
Computer Programmer job positions in the US are expected to decline 7% from 2018–28. (Bureau of Labour Statistics)
Since 2016, the demand for Data Protection Officers (DPOs) has skyrocketed and risen over 700%, due to the GDPR demands. (Reuters)
500,000 Data Protection Officers are employed (IAAP)
66% of cybersecurity professionals struggle to define their career paths. (ISSA)
60% of cybersecurity professionals aren’t satisfied with their current job. (ISSA)
Source: varonis
From the above, I will like to inform you that the Security Space is a rich one and even a growing one. Little wonder there is always an attack on devices and others trying to create solutions to repel those attacks.
Now, into the main session;
Definition:
Mobile Device Security refers to the plans in place to protect sensitive information stored on and transmitted by laptops, smartphones, tablets, wearables, and other portable computing devices from threats and vulnerabilities associated with wireless computing. One major goal is keeping unauthorized users from accessing our information and data.
Mobile Security Concerns:
Below is a list of Mobile Security concern for portable device users:
1. Device loss
2. Application security
3. Device data leakage
4. Malware attacks
5. Device theft
Why is mobile device security important:
1. Almost all individual owns a Smart Phone, information and data are now converted to be compatible with their devices.
2. Mobile devices are easily lost or stolen.
3. Almost anyone can create a malicious app that allows hackers to access your information.
4. Many users aren’t aware of this increased risk and go about their business under the impression that their existing mobile device security fully protects their data.
Mobile Security Threats needs to be reduced to keep one’s data secured. To avoid any breach, we need to take precautionary steps to reduce the risk.
Mobile Security Threats:
1. Madware and spyware
Madware is short for mobile adware. It’s a script or program installed on your phone, most times without your knowledge. What this does is to collect your data for the purpose of better targeting you with ads. Madware sometimes comes attached with spyware. Spyware collects data about you based on your internet usage and transmits it to a third party. That data is bought and used by companies to send you ads. Spyware also collects information about your location, internet usage, and even contacts. This isn't a challenge for you only, but for others you communicate with.
2. Viruses and Trojans
Viruses and Trojans attacks mobile devices. What they do is get attached to a program or software. They can take over your devices to collect or have access to vital information and data.
3. Malware from downloads
Malware from downloads are installed on your device without consent. If you visit the wrong website or open the wrong email, you might be exposed to a malicious file that automatically installs on your device. This could be adware, malware, spyware, or BOT, which can use your phone to perform malicious tasks.
4. Browser exploiters
These are programs that take advantage of security flaws in your mobile browser. Browser exploiter counters the smooth functioning of applications that works with your browser, like PDF readers. If you see your browser’s homepage or search engine change unexpectedly. This is to tell you, there is an attack.
5. Phishing and Grayware apps
Phishing apps are programs that sends you information to look like it’s from a real and trusted source. Phishing can be carried out through emails, phone calls or text messages. They request for your personal information and password, hoping you will respond. Most times, they secretly collect vital information you input like passwords, account numbers, credit/debit card details, etc.
Grayware apps aren’t fully malicious, what they do is to expose your device to privacy risk. Symantec found that 63 percent of grayware apps leak the affected device’s phone number and 37 percent provide device location.
How to Protect Your Devices from threats:
Mobile security threats concern may prick your heart, the steps below will surely help out.
1. Update your Software always: according to statistics only 20 percent of Smart phones are running the newest version and only 2.3 percent are on the latest release. Anything relating to the Operating System to Mobile apps are targets of hackers to tamper with mobile security. Keeping them updated give an edge to risks from security threats.
2. Get a Mobile Security: like your computer systems, your mobile devices need a security provider. I suggest we get a trusted and recognised provider, which may be free or a paid version. Most times, they provide you with a VPN (Virtual Private Network), Email Security, Device Scanner, App Locker, Anti- Theft, Web Browser protection, just to mention a few.
Remember to keep this updated always.
3. Get a Firewall installed: firewall helps provide a greater amount of online privacy and protect you against online threats.
4. Use a Strong Mobile Password: loss of device is a major concern; a strong password will give you an edge to unauthorised users. It is recommended to create a strong and unique password of at least 8 characters. Also, different passwords should be used for different purposes, which should be updated frequently. I will advise you get a ‘Password Manager’ where multiple account passwords can be stored.
5. Download Official Apps: official apps from recommended app stores doesn't stop you from getting bad apps, but you're assured of lesser risk.
6. Install only Needed Apps: one of the challenges with most mobile phone user is keeping apps the have little or no use of. this consumes space and other resources of your device, especially device permission.
7. Use Biometrics Authentication: Biometric authentication is when a computer uses measurable biological characteristics, such as face, fingerprint, voice, or iris recognition for identification and access. Multiple biometric authentication methods are now available on smartphones and are easy to set up and use.
8: Avoid Public Wi-Fi: a mobile device is a secured as the kind of network it is connected to. You need to understand that your device is at a risk when using public or unsecured Wi-Fi networks. Your device is under a risk from attacks of hackers who can easily breach your device through the network and steal your data.
9: Use Mobile Device Encryption as applicable: You need to locate this feature on your device, select the files you wish to encrypt, then set a desired password. this method helps convert your data to codes that are only accessible when the password is inputted. This will also help prevent unauthorised access to your data and information.
Conclusion:
You need to understand that Mobile Security is not a simple task and this should be taken as a top priority for anyone that wants to secure their information and data.
Taking precautions can help protect your device for various attacks and mobile security threats.
Thank you!
Ericson Bello
We can connect:
LinkedIn- https://LinkedIn.com/in/IAmBelloEricson
Medium- https://medium.com/@iambelloericson
Twitter- https://twitter.com/IAmBelloEricson
Facebook- https://Facebook.com/IAmBelloEricson
Instagram- https://Instagram.com/IAmBelloEricson
Telegram- https://t.me/IAmBelloEricson
WhatsApp- https://wa.me/2348037573610
Email- [email protected]
For Fashion Business:
Twitter- https://twitter.com/TailoredByFada
Facebook- https://Facebook.com/TailoredByFada
Instagram- https://Instagram.com/TailoredByFada
WhatsApp- https://wa.me/2347059832649
Email- [email protected]