Skip to main content

Many seniors are adapting to technology, and similar to many others in the society, perhaps more have chosen to adapt over the past two years so that they can continue doing personal business, and stay in touch with the world without having to always leave the comfort of their homes.

Several seniors are now doing their banking, paying for groceries and meals, and making retail purchases online from their mobile devices, such as their smart phones or tablets, just like other people; or they are using their devices to access or send a variety of information, including videos and links, to keep themselves occupied and informed.

However, although many persons may not immediately think of their mobile devices as computers, they in fact are, cybersecurity analyst at the JN Group, Garfield Rodriquez, reminds persons, and oneโ€™s mobile devices are just as vulnerable to attacks.

โ€œTherefore, people, including seniors, have to exercise vigilance,โ€ he cautioned.

โ€œHackers have come to realise that because often our mobile devices are less likely to have anti-virus installed on them, as we donโ€™t think of them as computers, they target them with rogue apps, spoofed online websites and phishing emails to steal passwords; TRN and other customer data are also targeted; your credit card information; bank account numbers and a host of other confidential and personal information,โ€ he explained.

โ€œThis doesnโ€™t mean you shouldnโ€™t do your business from your phone or other mobile device, but you do need to be aware and cautious,โ€ Mr Rodriquez said.

He provided some simple ways in which persons, including seniors, can protect themselves and their mobile devices from hackers.

  1. First, install a reputable anti- virus application on your mobile device, Mr Rodriquez recommended. โ€œAnti-viruses arenโ€™t only for your desktop computers and laptops.โ€
  2. Second, he advised that one should ensure that their mobile device and mobile apps are kept updated with the latest system patches. That means once an update is made available by the manufacturers or application owners, one should install them.
  3. When downloading a new app, one should take the time to carefully read the reviews before installing, he advised; and if thereโ€™s a website that one has never heard of before, then a check should be made to ensure the site is legitimate. One easy way of doing this, Mr Rodriquez recommends, is by going to the website virustotal.com, and simply entering the website address to check.
  4. The cybersecurity analyst also advised that before making a purchase online, one should look for the companyโ€™s phone numbers by checking its website and contacting their support personnel.
  5. Before opening an email, one should check the true origination. Persons should ask themselves: โ€œโ€™Do I know the sender?โ€™ โ€˜Is this the regular tone of the person and the kinds of words he or she would use?โ€™โ€ Mr Rodriquez said. โ€œItโ€™s always a good idea to contact the email sender immediately. However, not by replying to the email!โ€Also, one should not open an email attachment if they are not expecting one, he counselled. If there are links in the email, one should first see where they are actually coming from before clicking. To do this on a mobile device, one can simply press and hold the link and wait for the address to appear. Pressing and holding the link will not lead to the site, he assured.
  6. In addition, Mr Rodriquez cautioned persons against using public Wi-Fi for financial transactions or to transmit sensitive information as these connections are not secure.

โ€œWe have to exercise vigilance always and at all times,โ€ he concluded.

Was this article helpful?
YesNo