Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

BLOG: Don’t lose your identity to cyber criminals

David Hall | Nov. 19, 2012
While most people are security savvy when it comes to protecting their physical belongings, they need to work harder and smarter to protect their information and data online.

From PCs to mobile devices 

Apart from staying vigilant, consumers can also seek protection by using mobile security solutions such as Norton Mobile Security, which eliminates mobile threats before they can cause problems, and detects and removes threats and forbidden files without affecting performance. It also scans for threats on all existing files and SD cards, and monitors app updates downloaded onto the mobile device. 

In addition, Norton Mobile Security allows users to remotely locate and / or disable their mobile device if it is lost, stolen or has its SIM card removed. This prevents thieves from using it and accessing private information.  Users can even remotely delete all of their personal information so cyber criminals are unable to use it to steal their identity or money.  It also offers Web protection to keep users secure while they browse the Internet. 

Today, online risks are no longer just bound to PCs. The rapid adoption of mobile devices that are Internet-enabled, such as smartphones and tablets, pose new security risks for their users. Remember that fighting cyber crime is a shared responsibility, requiring us all to be more alert and invested in our online smarts and safety - protecting what is most important to each of us.

David Hall is regional consumer product marketing manager, Asia Pacific, Norton By Symantec 


[1] Based on Singapore Police Force Crime Statistics 2011 retrieved from http://www.spf.gov.sg/stats/stats2011_overall_crime.htm. The crime victim every quarter of an hour calculated as follows: total crime cases over 12 months in 2011 / 365 days per year / 24 hours / 4 quarters in an hour.

[2] Norton Cybercrime Report 2012, available at http://www.norton.com/2012cybercrimereport

 

 

Previous Page  1  2  3  4 

Sign up for CIO Asia eNewsletters.