How Mobile and Internet Service Providers are Protecting Subscribers from Cyber Attacks

Millions of people all over the world are under stay-at-home orders to slow the spread of COVID-19, and many more people are now working in their personal space, often on their personal computers and phones. These trends have led to a rise in fixed and mobile network traffic all over the world. In Britain, internet traffic increased into the double digits in broadband use, while cellular network traffic is up 50% for some mobile carriers across Europe. This increase in online activity makes a much wider target for cybercriminals looking for new entry points. Many, if not most, consumers are unaware that they can effortlessly be protected by their mobile and internet service providers that adopt network-based security solutions.

Currently, in 80% of the cyber threat landscape, a coronavirus theme is applied in some manner. Cybercriminals are disguising malicious websites as legitimate ones that host malware, duping users into downloading them. For example, CovidLock is ransomware disguised as an Android application that shows a COVID-19 global heat map. Cybercriminals are also spreading malicious websites via phishing emails, in some cases posing as the Center for Disease Control and Prevention (CDC) in the US and the European Centre for Disease Prevention and Control.

These threats necessitate that businesses and individuals take steps to protect themselves at home. Communication service providers, such as mobile carriers and internet service providers, who already have access to nearly all smart devices are in an excellent position to provide cyber protection to homes and devices, instantly and simply.

The first line of defense

The most common digital methods used by cybercriminals to lure victims are phishing e-mails containing malware hidden in documents and links through apparently “legitimate” websites that steer towards nefarious ones. If consumers find themselves with emails that evoke a sense of urgency or strong emotions, they should keep calm and be cautious of trusting the email’s content as it is a common tactic for phishing scams. It is important to think twice before providing personal details, downloading attachments or clicking links in any email or message, especially from an unknown sender.

Consumers are equally advised to safeguard the contents of their email with strong passwords and two-factor authentication, whether via email or SMS, for substantially more protection. One of the most fundamental principles of strong passwords is related to length; longer passwords are harder to crack. It is also vital to use unique passwords for each website, change them regularly and avoid using passwords based on personal information. To make a password that is easy to remember but difficult to guess, consumers should use a chain of numbers, symbols, and upper and lowercase letters, such as CyP4$sF to represent “change your password frequently.” Password manager programs can also randomly generate and store strong login credentials for all accounts but consumers must create strong master passwords.

Computer passwords are not the only passwords that should be changed and reinforced; home routers should be configured as well. However, changing the router password is not always enough. Once a home router is compromised, every device connected to the home network is at risk, which means cybercriminals can easily get access to every device and information stored within the device – from WiFi passwords to sensitive information on a phone. Furthermore, an attack that gains access to a home router can potentially see any traffic running across that network and execute any number of effective attacks. However, internet of things (IoT) devices are vulnerable and difficult to secure without a network-based solution (no matter what consumers do).

Mobile and internet providers can offer an extra layer of protection

During these dangerous times, wireless customers need a reliable security solution that protects them both from malicious URLs and infected files. To combat the variety of threats out there, many top mobile operators, like Telefonica, Hutchison Drei, and Vodafone, are turning to network-based security solutions to provide cybersecurity services that protect their customers.

Network-based security stops threats at the operator network level, far from customer smartphones and computers. It’s like stopping the bad guys at the entrance to your city instead of at the front door of your house. Because the protection runs on the network, no download is needed and requires absolutely nothing from customers other than agreeing to have it. Running in the background, the security solution becomes resident on the network already in place. Network-based security is compatible with any device and any operating system and is always up-to-date to confront the latest threats, which is good news for mobile and fixed subscribers.

Safe at Home

Communication service providers can not only provide this level of security for mobile devices but for computers as well, with solutions that deploy remotely on customer premise equipment (CPE), such as the home router, to secure homes from outside cyber threats.

By securing the CPE, the service provider actively uses AI to learn what devices are in the network and what their ‘normal’ behavior patterns are, then scans the internal network for vulnerabilities to prevent zero-day attacks and DNS manipulation, as well as block malicious code. It ensures those working from home need not worry about their information being compromised and can also have the option to add parental controls for their children’s devices. This becomes especially relevant as schools move to virtual classes and online entertainment and gaming surges.

Whether working from home or in the office, consumers should always take additional steps to protect themselves and their personal information from malicious cybercriminals, and mobile and internet service providers can protect these “work from home” (WFH) and “always-online” customers with cybersecurity services that protects all their smart, connected home devices.

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.