World Security Report2018-07-04 14:15:13
The spy in the room - People are generally unaware of the security threat posed by the camera or microphone of a cell phone left on the table during a meeting.
Many business agreements, mergers and commercial strategies are discussed over a cell phone. Professionals use this device constantly to share information about the development of new products or the state of legal proceedings in progress. If this information were to be leaked, it would have a direct impact on the company's income statement as well as the success or failure of operations in which months of work have been invested. And yet people are generally unaware of the fact that the camera or microphone of a cell phone left on the table during a meeting can be activated remotely.
At the same time, smart terminals are becoming increasingly powerful. Their memory records the calls made and how long they last, as well as the user's movements, work agenda, messages, photos, documents and emails.
For cyber-delinquents they are the best way of finding out a company's plans, practically in real time: all they need to do is hack a professional's cell phone to follow internal work meetings and telephone conversations with customers.
There are also certain tech startups that are offering their services on the black market to hack cell phones remotely and listen to calls. It has therefore become essential for professionals who handle strategic information to protect their phones properly.
More than 12,000 senior executives and professionals of Ibex companies and authorities, as well as Spanish government officials, have chosen Indra's COMSec solution to do this. The application is compatible with any operating system and smartphone model, is very convenient and easy to use, and offers end-to-end encryption for voice communications, messages and files. It can be used to establish multi-conferencing and video calls and create communications rooms for holding secure meetings. It can use mobile, Wi-Fi or satellite communication networks and is compatible with all other cell phone applications, such as the agenda, camera or email apps.
Indra's system is so efficient that it can even improve the connection establishment process in countries or areas of low coverage and at times when the networks are saturated or out of service. It also reduces the cost of international calls since they are made by exchanging data packets.
To guarantee complete cell phone security, Indra also provides a cyberintelligence and mobile security service, monitoring the phone configuration, connections, degree of vulnerability, permissions granted to the apps installed, and much more.
The solution also analyzes how each person uses their cell phone to identify any anomalous situation. The purpose of this function is to learn about connection patterns such as the apps and devices used most frequently, therefore establishing genuine "behavior biometrics" to detect whether the cell phone has been stolen or is being accessed by third parties. In providing this solution and related services, the company relies on the work of its digital transformation business unit, Minsait, which employs one of the most highly acclaimed teams of cybersecurity experts in the country and has an international network of advance cybersecurity centers, or I-CSOC, that are operational 24/7/365.
Lastly, to protect the security of cell phones in high-risk countries, the solution includes geolocation systems which the user can activate if necessary so that Indra can monitor the phone to prevent hacking.
For more information contact: