The Risks of Weak Mobile Security

  • Phone Verification

In case you havent noticed, cell phones are no longer just for talking and texting. Were living in a society that willingly wants to carry all of their information on one device rather than carrying multiple items like credit cards, coupons and loyalty cards.

Mobile commerce technology is growing- fast

As mobile commerce technology continues to be rolled out to consumers for convenience and integration more and more of them are taking advantage of the features on their smartphones. So what about when an account comes up short on money and the user wasnt the one who spent it? Most consumers see this integration as convenient and easy-to-use but generally forget about the security aspect. The problem is that consumers are more than willing to share their confidential financial information in order to use these features for mobile transactions.

Mobile-optimized web page security

Whether you are creating a mobile app to encompass these features or a mobile-optimized web page security and fraud prevention need to be top priority. These apps generally have the ability to access consumer information without that consumers knowledge. Information such as a phone number, device ID and location are easily captured from apps and HTML5 sites. This information can be of use when trying to acquire new customers, increase loyalty and learn about customer buying habits, so long as its protected. You must gain consumer trust and confidence while they are connected to you or your app. In order to maintain consumer confidence in this environment, it is the responsibility of the merchant to keep consumer information safe and secure.

Mobile payment security

Mobile payments and transactions provide consumers flexibility, convenience and value while offering merchants the ability to reach their customers, learn more about them and specifically measure the effectiveness of mobile marketing programs.

When building mobile technology that has the ability to capture and store personally identifiable information, companies should take into consideration how the security of PII will be maintained by weighing the advantages and disadvantages of each option. In doing this, they will not only protect themselves from a potential breach, but also protect their customers, thus avoiding a potential public relations challenge and affecting customer loyalty and commitment.

[Contributed by EVS Marketing]