Reality in Vietnam
To meet the growing demand for phone numbers, telecommunications service providers are increasingly turning to the practice of repurposing inactive numbers after a waiting period, typically between 45 and 60 days.
This is becoming more common as Vietnam sees a rapid increase in mobile phone usage, with a total of 168.5 million active mobile connections by early 2024 (DataReportal), equivalent to 169.8% of the total population. While this approach effectively mitigates the shortage of phone numbers, it also introduces a host of cybersecurity challenges.
The risks of reusing phone numbers
Raghav Iyer, product consultant, cybersecurity at ManageEngine, stressed that phone number reuse can pose cybersecurity risks ranging from security to privacy.
“Given the important role of phone numbers as digital identities, these cybersecurity risks, if not properly addressed, can facilitate identity theft. Bad actors can take advantage of recycled phone numbers to mask their identities and carry out various cyber attacks,” Raghav Iyer shared.
According to him, cyber attackers can find used phone numbers through various methods from monitoring online platforms, using phone number reassignment lists, purchasing data or random dialing…
He analyzed that reusing phone numbers will bring four security challenges. The biggest risk is that users are at risk of account hijacking. Accordingly, verification codes and account recovery details are often sent to a mobile phone number. If the number is shared with other users, this can lead to account hijacking.
In addition, phone number reuse can also lead to data leakage, calls and messages intended for the previous owner of a number will instead be received by the new owner; service disruptions; phishing and social engineering attacks…
Solution
To mitigate the risk of phone number reuse, according to Raghav Iyer, telecommunications service providers must implement robust protocols, including rigorous data cleansing procedures, to ensure the complete removal of personal information associated with reused phone numbers.
Furthermore, it is important to separate user identity from phone number. This can be achieved through the adoption of virtual numbers or temporary identifiers for online services.
Finally, user awareness and vigilance are of utmost importance. Individuals should be cautious when sharing personal information online and prioritize strong password practices. Enabling two-factor authentication and avoiding suspicious links are essential steps to protect against phishing attacks.
As demand for phone numbers skyrockets, service providers will inevitably turn to phone number reuse as a solution. However, this practice must be carefully managed to prioritize data privacy. Concerns about residual data, privacy violations, and eroded trust must be taken seriously.
A collaborative approach involving telecommunications companies, technology providers and individuals is essential to mitigate these risks.
By implementing rigorous data cleansing procedures, exploring alternative identification methods, and promoting cybersecurity awareness, the negative impacts of phone number reuse can be minimized and user privacy can be protected.
Source: https://laodong.vn/cong-nghe/nguy-co-tu-viec-tai-su-dung-so-dien-thoai-1395964.ldo
Comment (0)