Technology companies around the world have intensified their effort to curb the malware in a desperate attempt to stop hackers who are scaring away consumers from the lucrative smartphone market, according to EC-Council.
According to EC-Council, Hewlett-Packard is combining its security products and technology from recent acquisitions to unveil an expanded Enterprise Security Solutions portfolio, designed to help businesses deal with persistent security threats from cloud applications and social media.
Even computer peripherals manufacturer Kensington is pitching in with hardware-related security, coming up with a range of security cases that monitor the distance between a user and his smartphone.
EC-Council (News - Alert), which provides digital forensic training and is the creator of certified ethical hacker (CEH), says the markets for malware are expanding at a rapid pace. And it is now inevitable for technology companies to address privacy concerns expressed by the users of mobile devices and cloud computing.
EC-Council’s President Jay Bavisi says knowledge about operating system is also important for both companies and end-users to prevent hackers and malware.
The sharp rise in malware reflects the popularity of these mobile devices, and also highlights the need for consumers to educate themselves on the limitations of the devices they use on a daily basis.
Data usage on smartphones has never been as prevalent as it is today. The constant stream of data on-the-go, combined with the prevalence of convenient cloud computing, have only served to compound this lack of direct control over one's personal or corporate data.
EC-Council says consumers also need to be more vigilant about safeguarding the data on their mobile phones.
In other news, EC-Council and (ISC)² have signed a Memorandum of Understanding (“MOU”) that allows the organizations to collaborate to deliver programs, events and initiatives that will benefit the memberships of both organizations and the information security profession at large.
The MOU outlines joint activities designed to meet the demand for properly trained IT security professionals, including speaking opportunities, reporting of continuing education credits, and conducting sponsored education events.