{"id":614,"date":"2023-06-15T10:32:48","date_gmt":"2023-06-15T02:32:48","guid":{"rendered":"https:\/\/www.info-trek.com\/blog\/?p=614"},"modified":"2024-05-02T12:13:04","modified_gmt":"2024-05-02T04:13:04","slug":"its-time-to-address-mobile-device-security","status":"publish","type":"post","link":"https:\/\/www.info-trek.com\/blog\/its-time-to-address-mobile-device-security\/","title":{"rendered":"It\u2019s Time To Address Mobile Device Security."},"content":{"rendered":"\n<p>Smartphone ownership among employees issued by employers are becoming increasingly common, but how safe it is, really?<\/p>\n\n\n\n<p>Cellphone ownership is becoming increasingly common. It is estimated that approximately&nbsp;<a href=\"https:\/\/www.gsma.com\/mobileeconomy\/wp-content\/uploads\/2018\/05\/The-Mobile-Economy-2018.pdf\">5 billion people<\/a>&nbsp;worldwide possess mobile devices. Smartphones are not only for personal use, ask any workaholics \u2013 they probably have another smartphone especially for work.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Smartphones Is A Necessity For Work<\/h4>\n\n\n\n<p>Company smartphones are issued by employers to employees for one good reason alone \u2013 work productivity. It is not surprising that brands are making their presence known on mobile domain. Some&nbsp;<a href=\"https:\/\/rocketbots.io\/blog\/how-companies-do-whatsapp-marketing-and-support\/\">brands<\/a>&nbsp;are turning to Whatsapp Business to create engagement with customers through creative measures. The ownership of company\u2019s mobile devices at the workplace has become more necessary for employees to perform their duties.<\/p>\n\n\n\n<p>PC at workplace is often equipped and serviced to counteract potential cyberattacks but this may be uncommon for mobile devices as we don\u2019t normally associate disastrous privacy invasion, data breach, ransomwares, and the likes with mobile devices. However, this doesn\u2019t translate to mobile devices\u2019 absolute immunity to cybercriminals.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>In 2019, there was 50% increase of cyberattacks targeting mobile devices compared to the previous year.<a href=\"https:\/\/www.zdnet.com\/article\/mobile-malware-attacks-are-booming-in-2019-these-are-the-most-common-threats\/\">Source<\/a><\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Predators of Mobile Devices<\/h3>\n\n\n\n<p>Malware is one of the notable cyberattack options adapted to compromise the integrity of mobile devices. How can it catch a malware infection?<\/p>\n\n\n\n<p><em>Malicious app downloads<\/em>: Pirated apps unknowingly installed on the phone often contain malware. It latches itself on the smartphone\u2019s software and cause preventable damage and steal sensitive data.<\/p>\n\n\n\n<p><em>Existing operating system vulnerabilities<\/em>: Mobile devices work just like PCs \u2013 regular updates and patches keep them in good condition. Installed updates fortify the mobile devices against troubles stemming from vulnerabilities. Cyber criminals seek and exploit vulnerabilities on smartphone to make an entry.<\/p>\n\n\n\n<p><em>Opening suspicious e-mails<\/em>. Employees rely on mobile devices to check corporate e-mail inbox and this is an opportunity for cyberattacks. Suspicious e-mails, once open will initiate download and installation of malwares.<\/p>\n\n\n\n<p><em>Non-secure public Wi-Fi<\/em>: Public Wi-Fi should be avoided as it leaves the gaping question unanswered:&nbsp;<em>Who owns it<\/em>? Cyber criminals prey on the unwary and gain access to users\u2019 data through unsecured means.<\/p>\n\n\n\n<p><em>Text message phishing<\/em>: Cyber criminals may pretend to be someone else or a legitimize source. They proceed to ask for your personal information or about the device. Hacking may take place based on what was gathered for a targeted attack.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Prevent Cyberattacks on Mobile Devices<\/h4>\n\n\n\n<p>Never jailbreak the device: Jailbreaking removes numerous built-in security features which increases the probability of vulnerabilities.<\/p>\n\n\n\n<p>Download apps from reputable sources: Always double check who develops the app and look at the reviews to see users\u2019 feedback.<\/p>\n\n\n\n<p>Update software and hardware: Can\u2019t be bothered to update mobile devices during working hours? Update them at night to reduce the chances of interruption.<\/p>\n\n\n\n<p>Train the employees: Cybersecurity training is not just for PC owners \u2013 the scope is wider than general assumption.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Mobile devices should treated with upmost significance like how computers and servers are treated. If they are important for businesses, they are just as important for cybercriminals.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smartphone ownership among employees issued by employers are becoming increasingly common, but how safe it is, really? Cellphone ownership is becoming increasingly common. It is estimated that approximately&nbsp;5 billion people&nbsp;worldwide possess mobile devices. Smartphones are not only for personal use, ask any workaholics \u2013 they probably have another smartphone especially for work. Smartphones Is A [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":141,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/comments?post=614"}],"version-history":[{"count":2,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/614\/revisions"}],"predecessor-version":[{"id":1965,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/614\/revisions\/1965"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/media\/141"}],"wp:attachment":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/media?parent=614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/categories?post=614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/tags?post=614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}