Public Charging Stations: Bad for Our Device

Public Charging Stations: Bad for Our Device's Health?

Public Charging Stations: Bad for Our Device's Health?We’re under attack! USB-linked public charging stations can infect our devices and steal our precious data in under a minute.

Many of us would feel lost without them. In fact, we are so dependent on our mobile devices that we check them every six and a half minutes, according to a study commissioned by Nokia. As devices advance, we’re carrying more information and data on us, making each of us a more efficient road warrior but also more exposed to threat.

Fast forward to the next time you’re running between meetings when you get that devastating alert that your phone is about to die. You frantically look for your charger only to realize that there’s no outlet in sight, and you’re already five minutes late for a customer call. It’s enough to make you want to scream. We’ve all been there, and we’ll be there again.

At first thought, the conveniently located public power station in the airport, shopping mall or around the corner may look like your saving grace.  But, you may pay for it in the end.

Jacking Your Juice

Plugging your cellphone into a USB power kiosk grants the kiosk access to download your data – contacts, email attachments, photos, etc. The kiosk may also be configured to install malware onto your device. What’s worse? Any mobile device is vulnerable, and malware programs usually take under a minute to run. The kiosks can read and write data from your device, even if you have the USB data transfer mode disabled.

This becomes an even bigger problem when dealing with sensitive corporate information. The more data that employees are able to access on their smartphone or tablet means more information that’s susceptible to being hacked. Think about the resources that people have access to from their phones. Employees today are carrying the “keys to the castle” on their devices, and if just one plugs into a public charging station, the whole company could be compromised.

As this problem becomes more prevalent, media outlets are starting to build awareness about the dangers. They recommend that you bring your regular charging cable with you when you travel and plug that into plain electrical outlets, or invest in spare batteries for your device – anything you can do to avoid charging stations in public areas.

Don’t Panic

Fear not! We can stop silently cursing our drained devices. There are portable power solutions available that don’t require an electrical outlet and won’t force you to replace your iPhone, Android or tablet battery.

Everybody, every day is concerned about how much power their smart phones and tablets have left and where and when they will be able to recharge.

I want people to know that it’s time to be mindful of what we’re actually carrying with us on our devices. When it comes to charging, we need to keep it close to the vest (or in this case, right at our finger tips). Portable power accessories are out there – the trick is finding one that’s right for you so you can keep your personal data protected, and all your mobile devices powered up.

About the Author

Corey Lieblein is the founder and CEO of Innovative Technology.

Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • Genetec Security Center

    Genetec Security Center

    This major new release allows more system components to run in the cloud, reducing the gap between cloud and on-premises security systems. It also makes it easier to connect external systems and tap external data for use in dashboards, maps and investigations without relying on complex, specialized integrations. 3

  • VideoEdge 2U High Capacity Network Video Recorder

    VideoEdge 2U High Capacity Network Video Recorder

    Johnson Controls announces a powerful recording solution to meet demanding requirements with its VideoEdge 2U High Capacity Network Video Recorder. This solution combines the powerful capabilities of victor with the intelligence of VideoEdge NVRs, fueled by Tyco Artificial Intelligence, for video management that provides actionable insights to save time, money and lives. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3