The Three Little Pigs and Their Mobile Devices

Once upon a time, there lived three little pigs. As the little pigs grew older they each decided to build a home for themselves, and when they left home they were given a smartphone and tablet each.
|

Once upon a time, there lived three little pigs. As the little pigs grew older they each decided to build a home for themselves, and when they left home they were given a smartphone and tablet each.

The first pig was eager to build his house quickly, and built a little home of straw in no time at all. The second pig, who was also impatient by nature, built his house using sticks gathered from the nearby wood.

The two pigs watched on in amusement as their brother patiently worked away, carefully building his house using bricks and mortar. They found it so funny that they used their mobile devices to take photos and send updates to their friends.

Little did the pigs know that a big bad wolf, who lived just on the other side of the woods, was tracking their devices using malware. Seeing their pictures he howled with glee, and licking his lips he crept across the wood, ready to claim all three pigs for his supper.

Seeing the big bad wolf approaching, the pigs screamed in fear and ran inside their houses. The wolf went first to the house of straw, and huffed and puffed and blew the house down. The frightened little pig dropped his smartphone and ran to the second pig's house. The wolf now came to the house of sticks, and just as before he huffed and puffed and blew the house down. Now, abandoning their smartphones and tablets, the two little pigs ran to the third pig's house.

The big bad wolf tried to huff and puff and blow the house down, but he could not. He tried and tried, but the house was very secure and the little pigs were safe inside. Because the cleverest pig had invested in solid foundations, the big bad wolf was no match for the security in place.

The story of the three little pigs shows us the importance of protecting all of your devices. Nowadays we connect to the internet in many different ways, whether it's with a laptop, tablet or even a watch.

Anything that connects to the internet must be protected, regardless of what kind of device it is. The wolf was able to discover the weaknesses of the first two pigs as their houses were not secure, just as hackers will be able to access or steal your information if you don't protect all of your devices. With mobile representing the fastest growing target for cybercriminals, it's more important than ever to implement strong security software across all your devices.