Mobile Security

New data uncovers the surprising predictability of Android lock patterns

From Ars Technica:

Marte Løge, a 2015 graduate of the Norwegian University of Science and Technology, recently collected and analyzed almost 4,000 ALPs as part of her master’s thesis. She found that a large percentage of them—44 percent—started in the top left-most node of the screen.

Source: New data uncovers the surprising predictability of Android lock patterns | Ars Technica

It seems we are just as lazy with patterns as we are with passwords. This research shows we make Android lock patterns that follow predictable pathways. Most people start in a corner, the pattern progresses from top to bottom and from left to right and does not cross back on itself.

The shortest pattern involves four nodes that can create 1,624 different patterns. If you double it to eight nodes the possible combinations does not double it multiples more than 86 time to 140,704 possible combinations. Obviously bigger is better.

There are many systems that allow dentists or team members access to dental office data on a mobile device. For example a post op call list or the upcoming schedule. Some will even allow complete online access to the entire office computer system.

These apps are great and can be very effective but they are vulnerable to  possible patient data exposure or loss. It is essential that anyone with access to patient data on a mobile device do everything possible to secure the device, including complex passwords or lockout patterns.

Leave a Reply

Your email address will not be published.