Insights

The Risks of Weak Mobile Security

In case you havent noticed, cell phones are no longer just
for talking and texting. Were living in a society that willingly wants to
carry all of their information on one device rather than carrying multiple
items like credit cards, coupons and loyalty cards.

Mobile commerce
technology is growing- fast

As mobile commerce technology continues to be rolled out to
consumers for convenience and integration more and more of them are taking
advantage of the features on their smartphones. So what about when an account
comes up short on money and the user wasnt the one who spent it? Most
consumers see this integration as convenient and easy-to-use but generally
forget about the security aspect. The problem is that consumers are more than
willing to share their confidential financial information in order to use these
features for mobile transactions.

Mobile-optimized web
page security

Whether you are creating a mobile app to encompass these
features or a mobile-optimized web page security and fraud prevention
need to be top priority. These apps generally have the ability to access
consumer information without that consumers knowledge. Information such as a
phone number, device ID and location are easily captured from apps and HTML5
sites. This information can be of use when trying to acquire new customers,
increase loyalty and learn about customer buying habits, so long as its
protected. You must gain consumer trust and confidence while they are connected
to you or your app. In order to maintain consumer confidence in this
environment, it is the responsibility of the merchant to keep consumer
information safe and secure.

Mobile payment
security

Mobile
payments
and transactions provide consumers flexibility, convenience and
value while offering merchants the ability to reach their customers, learn more
about them and specifically measure the effectiveness of mobile marketing
programs.

When building mobile technology that has the ability to capture
and store personally identifiable information, companies should take into
consideration how the security of PII will be maintained by weighing the
advantages and disadvantages of each option. In doing this, they will not only
protect themselves from a potential breach, but also protect their customers,
thus avoiding a potential public relations challenge and affecting customer
loyalty and commitment.

[Contributed by EVS Marketing]

Explore more articles