As 2018 winds down, we are looking ahead to the new year with great anticipation. From the connected home to the connected workplace, mobile networks will knit together our devices to create a smarter world where devices multiply and the opportunities for security SNAFUs increase proportionately.
On an individual level, people will conduct more and more of their banking, shopping and communications via mobile devices. The customer-facing mobile environment will become more sophisticated, more complex and in greater need than ever for more security.
Let’s take a look at six trends that have been growing this year and that we think will continue to bloom in 2019! We expect that these new technologies, part of the “gone mobile” movement, cause an impact on where we focus our cybersecurity efforts.
Making Waves With Personal Technology
Mobile wallets like Google Pay and Apple Pay will see greater adoption. With better encryption than a credit card, these mobile wallets will be easier and safer to use than plastic. Their proliferation will help people pay for every-day items from groceries to gas while also making it easier to search, shop and purchase items directly from their phones.
Devices such as the Apple Watch and Fitbit will increase their workloads. They’ll offer much more than the time, the ability to simply track the number of steps a user takes each day, or to email and text friends. In addition, expect wearables to provide a direct link between humans and their healthcare providers. Devices will capture increasingly sophisticated data on cardiac health, blood sugar, or calories consumed that can then be uploaded to a personal health record that can be shared with physicians or insurers. This ability to track patient health in real time promises to revolutionize our concept of how people interact with their healthcare providers.
In addition to a smartphone and a laptop, more people will also purchase a personal digital assistant, such as Microsoft’s Cortana, Amazon’s Alexa and Google’s Assistant. People will use voice technology to interact directly with these devices, which, in turn, can be used to monitor a home electronics network or to order a takeout pizza that Uber will deliver directly to the door.
A voice command to Amazon Alexa will be sufficient to turn the heat down, activate a security camera or even to start the evening’s dinner in the slow cooker.
Operating Systems Upgrades
Google users are currently tasked with running specific operating systems on specific devices, Android on smartphones and the Chrome OS on tablets. While rumors of a new Google OS. FUCHSIA, which would be a fusion of the Android OS and Chrome OS, have been around since 2017, this could be the year that Google finally rolls it out. The big benefit of Fuchsia, of course, would be the ability to run it on any Google device and the likelihood of opening up new interoperability horizons.
Fuchsia promises to make real a world where Google phones, tablets and laptops can speak to home technology devices. We can get a sneak preview of Fuchsia now on the Google Pixel Slate.
With Apple updating its smartphones annually at a September event, the company should be on track to roll out three new models in 2019. Some of the biggest questions for the 2019 iPhone is whether or not it will be 5G compatible and how much better will the camera be?
What’s needed to power all these new applications and the mountains of data they will transmit is an upgrade to the underlying wireless network. In 2019, we can expect the next-generation 5GNetwork to become a reality and compatible devices to hit the market. Because 5G guarantees faster data transfer speeds and greater connectivity, it will help capture and transmit data from our wireless devices and to power the Internet of Things.
For consumers, this raises the question of whether to upgrade their mobile devices or not. Is it worth it to buy the 5G-compatible iPhone, or is a more gradual migration to the newer, faster network the best way to go? Will they need new applications to power their personal wireless domains? Or will this all be outsourced and provided by a Cloud carrier, such as the local cable provider ?
One thing’s for sure: Most of these tendencies will generate a strong shift in mobile security.
The amount of sensible mobile implementations is growing steadily and, unfortunately, they are not being secured properly.
It has been the case with personal assistants, and with outdated network protocols. It’s more than important to move forward without losing our focus on creating technologies that can stand the test of time.