TOP | Weekly Column | (Indonesia) Brainware, The Ultimate Smart Device Guard

Brainware, The Ultimate Smart Device Guard
Ministry of Communication and Information Technology of Indonesia
Ms. Intan Rahayu and Ms. Inne Ria Abidin
 
In 1950, the concept of home automation was introduced in a fiction story. Ray Bradbury wrote "There Will Come Soft Rains" and described how an automated house could run itself even without anyone live in it. In 1998 until early 2000s, the fantasy becomes reality. People could enjoy breeze of the air conditioner only by stepping in into the room, turn the lights on or off by clapping hands, turn the music on, set the volume up or down only by speaking. Home automation is no longer a dream.
 
This automated system is conducted by the coordination of the smart devices. The intelligent electronic devices that can connect, interact and share information with its users and other instruments through wireless connection such as Near -Field Communication (NFC), infrared, Bluetooth and Wi-Fi. Smart devices such as wearable health gadget, glasses, television, camera, even refrigerator usually synchronizing with mobile devices like smartphones, tablets and phablets.
 
Although the full-automated-houses has not been applied yet, the usage of mobile devices in Indonesia is getting increased. According to the GFK, from 10 people connect to the internet, there are 9 connect through their smartphones. Seeing the opportunity, several vendors also offer house-surveillance programs so the people could monitor the situation in their houses through their smartphones. Unfortunately, this feature has its own security risk.
 
As it become widely used, smartphone become a proper target to land the attacks. Moreover, with the policy of Bring Your Own Device (BYOD) policy applied in most organization nowadays, smartphones become the door to gain access into several places with a single breach.
 
For example, an employee’s smartphone was stolen. The thief successfully unlocked it and gain access to all of the owner's virtual accounts. Imagine if the thief impersonate him/her. The thief could act as him/her to ask for financial favor to the colleagues, buy things, or even earn more money by asking for ransom to the owner. That was only an example of physical security violence. Remotely, the threats could come in a form of mobile phishing, ransomware, SPF agent, or even cryptocurrency mining application.
 
The usage of multiple devices is also popular. Usually, people have a laptop/PC, smartphones, tablets, smartwatch, or health wristband detector. The question is, how to protect all the smart devices at the same time? If several years ago we install an antivirus application in one device at a time, now it’s better to use the service of all-in-one protection pack which provided by several security vendors. It is way more user friendly and effective to earn a simultaneous protection.
 
Furthermore, since data has becoming the latest currency, backing up data is no longer an option. It becomes an obligation for all smartphone users. We will never know when an incident would happen. It’s better safe than sorry. Backups could be done by saving our crucial data in several hard or cloud drives.
 
With the convenience offered, people tend to forget protect themselves because of the complicated procedure. Security is always acts inversely with comfort. The more secure the system is, the more discomfort the users are. Because they have to unlocked several layers to gain access to the preferred data. To secure the systems using hardware and software is easy, but educating the brainwares how to protect themselves is most powerful guard.
 
 
 
Disclaimer: The views and opinions expressed herein are those of the author and do not necessarily reflect the views of the organization or its affiliates, and the copyright belongs to the author.