Home / News / Increasing vulnerabilities of technological systems

Increasing vulnerabilities of technological systems

Data from the analysis of Android and iOS security systems during 2017 were recently presented, examining how the threat and vulnerability scenario evolved during this period.

In a dialogue with companies & businesses, Cecilia Pastorino of ESET explained that with regard to information security, and especially computer systems, there is nothing that is 100% safe. ” It is impossible to guarantee 0% vulnerability or that there is no risk at all, ” he warned.

As far as the Andorid system is concerned, the report indicates that one of the most important reasons why the security of the system is violated is the non-updating of the version. Only 0.3% of users migrated to the latest update (8.0), which is the one with the enhancements that stop ransomware blocking screens and malware looking for administrator permissions.

This led to 735 failures, or 40.5% more vulnerabilities than in 2016. The figure also increased for iOS, a system in which 365 errors were recognized, by 126.71% more than those found in the year preceding this last analysis.

On the other hand, with regard to the detection of malware (harmful software) for Android, this decreased by 47.24% compared to 2016, while for iOS it decreased by 54.60% compared to the same year.

Because of the data in the report, Pastorino was consulted on the measures that users can take to avoid damage to the system of their devices. He said that ” it is best for everyone to be educated about best practices,” among which he named the use of secure passwords, always update the operating system and applications to the latest version.

He added that”a good habit is to back up all important data, as well as to use only official stores to download applications always corroborating comments, ratings and permissions.” On the other hand, the interviewee stressed the importance of always using known and private networks, especially if sensitive information is handled, such as credit data or login credentials.

The fact that a computer is breached, therefore, is not only because of the system, but also because of the measures taken by each user at the time of its operation. This is why the interviewee said that “to infect the equipment, malicious codes use two resources: the exploitation of security flaws in the device; and the ingenuity of the user.” It is possible to say that threats and risks depend both on the user’s ignorance or neglect, and on vulnerabilities in the system that have not been corrected.

To minimize threats, ESET has different tools that protect data, allow you to find stolen devices, block it, and remove all information remotely.

“It is up to us to minimize these threats to the fullest. That’s why it’s important to know vulnerabilities, how to correct them, and take the necessary protective measures to try to prevent an incident from happening, or in case it happens, the damage is minimal,” Pastorino said.

Leave a Reply

Your email address will not be published. Required fields are marked *