Thu. Apr 25th, 2024

Software Update In Samsung: Should Smartphones Have Enforced Security Updates?

By KWS Adams Sep 15, 2022
Software Update In Samsung

Over time, Android phones including Samsung, Tecno, etc, and Apple iOS devices like the iPhone 6s, iPhone 7, etc have been formatted to evolve in order to keep up to date with the ever-changing landscape of cybersecurity. New security risks are constantly cropping up which can put your device and personal information at risk.

However, with some older smartphones, for example, the Samsung Galaxy S7 and Galaxy S7 Edge no longer eligible for security updates and other device users not always updating to the latest security updates, the question is whether smartphones should have enforced security updates has been raised.

Without the latest security updates in Samsung smartphones, hackers and scammers can exploit vulnerabilities within the device’s software. The longer the phone goes without being updated, the more the risks increase. As a result, EU lawmakers have recently proposed that smartphones should have enforced security updates as a way of reducing the number of cyber attacks. But, should this be the case? Let’s take a look at some of the reasoning behind such a debate.

Would Enforced Updates Work?

Regulators have suggested that phone providers, including Apple and Samsung, provide at least 5 years of historical security updates and around 3 years of OS updates to devices. This means that any security and operating updates could reach all users within 2 months following the latest release.

If enforced, these rules could drastically change the way that Android OEMs carry out software support for their devices. Samsung and Google are, so far, the only phone brands that promise at least 5 years of security updates for their devices. Samsung also provides 4 major Android updates for premium devices.

A regulation such as this could force smartphone companies to roll out longer updates, not only just for their flagship smartphones but to also include the fewer premium devices that don’t usually get long-term security updates. It’s also been proposed that, in the event of security and device updates, the battery capacity of devices should not be compromised – an issue that frequently affects Apple devices.

Samsung’s Quality Software Updates

When it comes to Android phones, Samsung’s software updates are often hailed as being the best quality. From releasing security updates before needing to offering up to 4 years of OS upgrades for many devices, Samsung does it all when it comes to security updates. If the EU proposal becomes a compulsory law, other device manufacturers will likely be required to step up to a new level.

The EU proposal suggests that devices sold in European countries should get up to 3 years of OS updates, with 5 years of security updates included. With Samsung already providing that level of protection, without even being made to, it means that they have a huge advantage should the EU proposal go through. Other manufacturers, mostly those based in China, don’t have the resources in place to follow these new regulations with pace or urgency.

EU lawmakers will also want manufacturers to support these devices and update them with part repairs for at least 5 years. With that being said, it’s important to remember that these are just proposals now. Samsung is already at a huge advantage compared to its competitors with quality software updates in place. With so many resources at its disposal, Samsung could easily start providing updates to its devices, for a longer time span, to get even further ahead.

Check and Update Samsung Software

  • Tap “Apps”
  • Tap “Settings”
  • Tap “Software Update”
  • Tap “Download and Install”
  • Tap “Install Now”

What To Do If Your Phone Is No Longer Supported

If your phone is no longer supported by the latest updates, then you might want to consider upgrading your device. This is because, without the latest updates in place, your phone is at more risk of being hacked or compromised. If you use older or outdated devices for work phones or to run the software, then this could be trouble for your business, so you may want to consider upgrading your devices.

●    Manage Device Permissions

You can manage different app and program permissions in your device settings to control access. Some apps are renowned for requesting permission for numerous different privileges, such as locations, contacts, photos, and calendar reminders. Hackers and scammers can access this information through the apps, and use this to ask for money from you, or use the information maliciously.

●    Recognise Common Phishing Scams

With fewer security measures in place, this means that you may be more vulnerable to attempted phishing attacks and scams. Phishing is when scammers act as a legitimate company in order to obtain valuable information, typically through emails, but this has now evolved thanks to technological advances and can be delivered through text or over the phone.

It’s important to recognize some of the more common signs of a phishing scam, such as misspelled words in URLs ( such as am4zon.com), suspicious sender emails, poor grammar and lack of professionalism, and no presence of a legitimate web address or contact information.

What To Do If You’ve Been Hacked

If your personal device has been hacked, the most important thing to do is not panic. Anyone can be vulnerable to having their device hacked. Take a look through your apps and delete any that you don’t recognize.

Whilst Apple and Android devices are considered reasonably safe, you may want to consider adding another layer of security through the use of antivirus software. If you use the device for business purposes and sensitive information is stored on the device, or there is access to software, consider contacting a cyber incident response company to manage the effects following a breach.

By KWS Adams

My name is KWS Adams . (Call me Kateregga). I am an IT addict who loves playing around with computers and internet. Computers help me try out different things while turning them into reality, while the internet powers me stay live online. Besides computers, I am a project planning and management professional with an Award obtained from MUK, one of the oldest and best Universities in Africa. Find me on Twitter, Facebook and Whatsapp. Find more on how to contact me using the contact me page.

Related Post

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.