Our dependence on Mobile Technology is putting our privacy at risk. Of course, there is an argument that if we are not doing anything wrong then it doesn’t matter if your nations intelligence services wish to look at what we are doing. But really, how easy is our mobile technology compromised? Anyone that has a vague interest in digital security is likely to have heard about our vulnerability, on a personal, commercial, and national level. But what of the less tech-savvy, are they aware of the potential risks.The mysterious world of cybersecurity is a complex thing, full of acronyms and techno-babble. To understand the news reports you may sometimes feel that you need a computing degree.

Which is why I am going to attempt to quantify our risks.

What are the risks?

Even if you do not have any interest at all for cybersecurity, you will undoubtedly have heard rumor and speculation that Russian spies are apparently at work chipping away at our national security, while hackers from the east [VIDEO] are planning on taking down our digital infrastructure. All of which sounds a little too James Bond for anyone to be seriously concerned.The truth is, with our unquenchable addiction for mobile technology, social media, and hipster cool we are not only exposing ourselves but everyone else in our virtual networks.

In the last few months, I have had many messages that read something like "OMG... is that you in the video?" Of course, I am expected to click the link to view said video.

All these spurious messages have come from contacts, who were too inquisitive for their own digital good.The elephant in the room is how easy is it for an ill-doer to get hold of the technology needed to hijack our Mobile Device and steal our data. It is not only poor passwords and our inadvertent interactions with phishers, spammers and scammers, we also need to take care of our roaming data connections.

The vulnerability lies in how mobile phones connect to the network. To maintain uninterrupted service your device latches onto the strongest network signal it can find. Consequently, anyone with the right technology can intercept your mobile communications. This real and present risk exists as you walk through the city, while on an airplane or train, at the airport, even in your office building.Hackers using a bit of technology, called “stingray”, that can access information stored on your mobile device. Then there is "big-brother" surveillance, I read recently that the Canadian federal court is giving permission to their domestic spy agency to continue using what is called International Mobile Subscriber Identity-catcher (IMSI-catchers) or as previously described stingray technology, in some cases without warrants.

What you may find alarming about this type of security breach, is that stingray technology is readily available. Anyone with a modest budget could be reading your data on your daily commute. So, what can you do? To be honest, not a lot, if you're connected, you're at risk. One solution would be to keep your sensitive information in a non-digital format, on paper! Then you will only have the worry of accidental damage and physical security. The mobile network providers and our governments realize there's a risk, but their biggest defense at the moment appears to be to keep a lid on how simple it really is, while they bolster national security.