Cyber Security Issues For The Mobile Industry

The widespread availability of spyware, and international scandal over the  technology being used to intercept and monitor supposedly secure communications platforms is combining with growing concerns of the security of 5G network technology to undermine confidence in the mobile industry.

More and more mobile users are aware that their smartphones and the networks that they rely upon are a lot more vulnerable than they thought. 

Against this backdrop, Members of the Board of Directors at The Mobile Ecosystem Forum were asked to consider cyber security issues and share their predictions for the mobile industry in 2023.

 

Verifiable Credentials Will Gain Major Traction

In 2023 we will see the use of Verifiable Credentials start to gain real traction. It's the next generation of digital identity in which people keep their identity information in their own personal digital vault rather than it being managed by a third party. 

The important thing for the industry to keep in mind is that everything about transactions will be standardised by brand new World Wide Web Consortium (W3C) standards. So, the key to this is not the technology but the W3C standards. 

However, as the technology converges around this issue, we will see some great solutions that will create a new layer of trust around verified credentials. This will benefit everyone, especially those in developing countries where bank accounts and documentation are less common. With trusted verified credentials, people in these regions will suddenly be able to access a whole range of services that were previously closed off to them. I think that’s going to be a real game-changer.  Contributed by Andrew Bud, CEO of iProov

IOT Security Standards Are Coming

With the increasing number and complexity of Internet of Things (IoT) devices and the amount of sensitive data they collect and transmit, security is a critical concern. Ensuring the security of IoT systems is essential both for protecting the privacy and safety of individuals and organisations, as well as maintaining the integrity and reliability of critical infrastructure.

Unfortunately, the industry is failing to self-regulate when it comes to IoT security. Paying a premium to enforce IoT security or standards isn’t profitable, so there is no incentive for device manufacturers to worry. As a result, regulators are currently grappling with the issue and, I expect, will be publishing legislation in 2023.

Manufacturers will need to address security issues by embedding measures such as encryption, authentication, access control, and vulnerability management into their IoT devices. So, prepare now!  Contributed by Dawood Ghalaieny, CEO of Zariot

Mobile Operators Offering New Identity Services

Currently, mobile operators are really struggling to find ways to grow their revenues beyond traditional services: voice, SMS and data. Yet, one asset mobile operators can monetise is mobile identity.

Over the coming year, I expect we will see a breakout of systems whereby enterprise can query mobile operators to verify a customer’s age, address, credit status, etc. This information is known and verified by mobile operators to establish a contract, and it is tied to a unique number: a phone number. So, phone numbers could become the unique identifier to verify all this information. 

It will be interesting to see how enterprise will take all those pieces of information and use it to formulate an opinion on a customer that can be used and monetised. It would make things much easier for customers - rather than filling out forms and completing Know Your Customer (KYC) data, they could simply link their mobile number. In turn, this would also be very helpful to businesses. Contributed by Jason Lunn is Global Connectivity, CPaaS at Cisco 

Preventing Fraud Will Become Essential

As the global technology market has grown, so too has a shadow economy of fake accounts. Robots set up fake accounts which are then served ads, draining advertising budget with no benefit. It’s also hard to estimate the size of this shadow economy - it could already be very big.

Telecoms operators play a key role in this economy. Take social media, for example. There are thousands of robots creating fake accounts, with lots of SMS being sent to activate and serve those fake accounts.

On the other side, mobile customers are receiving an unprecedented level of fraudulent phishing (or ‘smishing’ as we call it for SMS) messages with dangerous links.

To help combat these issues, a lot of organisations are currently working on more holistic, 360-degree solutions which would combine multiple data sources into a data pool to analyse and come out with intelligent identification of possible fraudulent transactions as soon as they're triggered.

By using artificial intelligence and machine learning for fraud prevention, organisations will be able to identify patterns immediately and flag off possible situations of fraud and phishing/smishing. They can then intercept these fraudulent or spurious links, displaying a landing page where a user is notified that it’s possibly a fraudulent page, similar to the warnings users get in the likes of Google Chrome. They will also, then, be able to track and block these fraudulent accounts more quickly, making fraud much harder to commit.  Contributed by Anurag Aggarwal is VP Partnership and Alliances at Tanla.

 

Dario Betti is CEO of the Mobile Ecosystem Forum 

You Might Also Read: 

Conversational Commerce Is Going To Be Big - But Could Be Risky:

____________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Building An Identity-First Security Strategy
Europol Arrest Crypto Currency Fraud Gang »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Becrypt

Becrypt

Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisations to protect their customer, employee and intellectual property data.

Nuix

Nuix

Nuix specialise in extracting knowledge from unstructured data. Applications include Digital Forensics, Cybersecurity Intelligence, Information Governance, eDiscovery.

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

CyberGuarded

CyberGuarded

CyberGuarded are an accredited vendor independent information security testing and auditing company.

Padlock

Padlock

Padlock is a trusted platform with an intimate knowledge of the cybersecurity industry that connects businesses with freelance professionals

Safe Security

Safe Security

Safe Security (formerly Lucideus) provides Cyber risk assessment services and platforms to multiple Fortune 500 companies and governments across the globe.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Systems Assessment Bureau (SAB)

Systems Assessment Bureau (SAB)

Systems Assessment Bureau is an internationally recognized ISO Certification Body with a unique vision of “Excel together with global standards”.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

Deloitte

Deloitte

Deloitte is a multinational professional services firm providing audit, consulting, financial advisory, risk management, tax, and related services to clients.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk Management Center of Excellence (US-InRM)

The US-InRM Center of Excellence is a nonprofit organization dedicated to promoting private, public, and academic partnerships to foster knowledge sharing and resources to mitigate insider risk.

Cyber Grant

Cyber Grant

Cyber Grant excel in designing cybersecurity solutions for data protection. Our approach and vision, centered on ease-of-use, establish us as a benchmark in the industry for safeguarding information.