Tip:
Highlight text to annotate it
X
Hi, my name is John Marinho, Vice President of Technology and Cybersecurity at CTIA
The Wireless Association
For this month's Wireless at Work, which is focused on cybersecurity, I'm going
to provide a quick overview on how the wireless industry is protecting its
customers and networks and what you can do to protect your personal information
against cyber thieves.
First, it's important to recognize that there are a number of companies that
constitute the wireless industry.
From the device manufacturers to the app developers to network operators, the
industry is as diverse as its users, which also means that there is no single
solution to cybersecurity. Since cyberthreats are constantly adapting and
evolving, the industry must be flexible
so it can adapt and evolve as quickly and protect itself and its customers.
It's also vital that Congress pass a bill that provides liability protection so
that all of the companies within the wireless industry are able to share
information with each other, and when it makes sense, with the government, to identify
possible cyberattacks and solutions. While limited without Congress
passing a bill, CTIA established the Cybersecurity Working Group, to foster
better information sharing and create a roadmap for those who work toward mobile
cyber security
Comprised of senior representatives from companies throughout the wireless
ecosystem, the working group works to provide users information and tips on how to
protect themselves from cyberthreats. But mobile cybersecurity is not merely
an industry problem;
in fact, everyone, including consumers, must be active participants. With CTIA's
Cybersecurity Working Group, we developed 11 tips, using the word "cybersafety"
as an acronym, so consumers know what they can do to protect
themselves and their personal information against malware, spyware,
viruses and other cyberthreats. Some of these tips include: don't click on suspicious
or unknown links, don't jailbreak your phone
and update your operating system and apps when prompted. In addition,
consumers
should only download apps from trusted and known sources. Before downloading or
installing an app or software, make sure to read the user agreement since some
companies may use personal information for advertising or other uses.
Finally, CTIA also recommends everyone takes a couple of minutes to set a password
or PIN so that unauthorized users cannot access your information on your phone. It
really is simple and can take less than a minute. Visit BeforeYouLoseItDot.Org
where we provide step-by-step instructions on how to setup a password
or PIN on your smartphone. You'll also find a list of apps you can download that
would remotely lock,
track
track and erase your information in the event your device is ever lost or stolen.
For more information on what you can to do to fight cyberthreats and to learn what the
wireless industry is doing, visit our website.