IT Examiner School, Providence, RI
Understanding future IT security developments (Cont.)
Current vulnerabilities in current mobile computing technology (continued) Unauthorized access to sensitive/proprietary data Elevated risk of use of unauthorized software Loss of data due to greater difficulty in making backups Mobile devices used without owners’ knowledge Interception of clear text communications Non-secure email Vulnerabilities in wireless networks and protocols (including encryption protocols)
Copyright 2010 Emagined Security – All Rights Reserved :-
Conclusion
Payment volumes are rising and becoming more electronic
Mobile is exploding, mobile payments are still in their infancy, and terminology remains unclear
Banks are the biggest threat to mobile payments adoption because of their focus on fees
Mobile RDC may actually slow the decline of check usage in the P2P, P2b market
Made with FlippingBook Annual report