<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.element14.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Firm issues security advice to wireless communication device users</title><link>https://community.element14.com/learn/publications/w/documents/8987/firm-issues-security-advice-to-wireless-communication-device-users</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>Firm issues security advice to wireless communication device users</title><link>https://community.element14.com/learn/publications/w/documents/8987/firm-issues-security-advice-to-wireless-communication-device-users</link><pubDate>Fri, 08 Oct 2021 03:43:49 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:f5091aa9-5d78-4726-ae14-e89f82c74be1</guid><dc:creator>e14news</dc:creator><comments>https://community.element14.com/learn/publications/w/documents/8987/firm-issues-security-advice-to-wireless-communication-device-users#comments</comments><description>Current Revision posted to Documents by e14news on 10/8/2021 3:43:49 AM&lt;br /&gt;
&lt;span&gt;Mobile phone users need to be aware of the fact their device is always susceptible to an attack.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;This is according to Martyn Ruks, technical director at MWR InfoSecurity, which support clients in identifying, managing and mitigating their information security risks.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Mr Ruks explained that there is value in wireless communication device users recognising this, as the information contained inside their handset can be often of a sensitive nature.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&amp;amp;quot;There are people who are interested in gaining access to those,&amp;amp;quot; he explained.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&amp;amp;quot;The first step is the user understanding that there is something that needs protecting. The next step is really acting with an amount of common sense. That [means] understanding that adding additional software to that phone may expose you to risk.&amp;amp;quot;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;He did, however, concede that mobile phones generally have slightly more protection than normal PCs, adding that this is due to the fact that the phone software is distributed through a single source.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Posted by Andre Dixon&amp;nbsp;&lt;/span&gt;&lt;a href="http://feeds.directnews.co.uk/feedtrack/justcopyright.gif?feedid=1785&amp;amp;itemid=800727094"&gt;&lt;img alt="ADNFCR-1785-ID-800727094-ADNFCR" src="http://feeds.directnews.co.uk/feedtrack/justcopyright.gif?feedid=1785&amp;amp;itemid=800727094" /&gt;&lt;/a&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>