Smartphones and tablets are often the preferred devices for communications, web searching, and accessing many types of apps. The reason? They are portable, and you can use them anywhere.
These mobile devices are taking over many activities done on traditional computers.
For example, Microsoft estimates that up to 80% of an organization’s workload gets completed via mobile devices. In addition, employees conducted half of all web searches from a mobile device rather than a desktop PC.
This has caused mobile devices to become more targeted over the past few years. As hackers realize mobile devices are holding many of the same sensitive information and app access as PCs, they’ve been creating mobile malware and other exploits to breach mobile devices.
In 2020, approximately 36.5% of organizations felt the impact of mobile malware, and 2.5 million people unknowingly downloaded multiple mobile adware apps.
It’s important to start treating mobile devices like you do computers regarding their security. Smartphones and tablets need the same types of security precautions in place, including:
- DNS filtering
- Automated OS and app updates
- Managed backup
It would help to look for the most prevalent mobile device threats that allow your data to be leaked or breached. Here’s a roundup of what those are.
1. MOBILE MALWARE HIDDEN IN APPS
It’s not easy at first glance to tell the difference between a legitimate free app and one with malware hidden inside.
Scammers will use the same flashy graphics, and the app may even have a high star rating (most likely boosted through suspicious means). The app may even do what it says it will do when downloaded.
But malware can be hidden in the background, infecting a device after the app installation. These apps will also hide once on your phone or tablet, using the icon of a common default system app (like settings or calendar).
Mobile malware can include all the same types of malware that can infect a computer, such as ransomware, adware, spyware, trojans, and more.
2. UNPROTECTED COMMUNICATIONS
Have you ever sent someone a password or credit card details over a text message or messaging app? Did you check to see if the communication was encrypted?
Many users will use various methods of communication from their mobile devices without knowing how secure those methods are. If sensitive information is transmitted and not encrypted, a hacker could easily intercept it.
3. PUBLIC WI-FI & MAN-IN-THE-MIDDLE ATTACKS
Public Wi-Fi is known to be non-secure, yet people still use it when it’s available. They want to save their mobile minutes or get a faster connection.
75% of people admit to connecting to email when on public Wi-Fi. Other activities people will do is sign into apps (even sensitive ones like online banking) and shop online, entering credit card details.
If you’re on public Wi-Fi, you’re at high risk of a man-in-the-middle attack. This is when a hacker connects to the same network and looks for victims with unprotected communications. They can then capture any data they’re transmitting.
One way to safely connect to public Wi-Fi is to use a VPN app to encrypt your communications.
4. JUICE JACKING ON PUBLIC USB CHARGING STATIONS
Another public mobile breach danger is public USB charging stations. These are often welcome sights, especially if you’re low on battery power. However, hackers can infect public USB charging ports with malware and set up fake charging stations in public areas.
Then, when you insert your USB cord to charge your device, the malware copies all the data on your phone and infects it with malicious code. See, USB cables aren’t just for charging. You can use a USB for data transmission as well.
It’s best to avoid public USB charging ports and charge with your power adapter that plugs into an outlet instead. You can also buy a “charge-only” USB cord if USB charging is your only option.
5. NON-UPDATED DEVICES
Approximately 40% of Android devices are running outdated operating systems that no longer get important security updates.
When your mobile device is not updated, it’s easier for a hacker to use an exploit that takes advantage of a code vulnerability in the OS or one of the installed apps.
Many companies aren’t paying attention to how many employees’ work devices are running current operating systems, which puts their networks at higher risk of a breach.
You should ensure that all your apps and OS are updated because many of these updates include critical security patches.
ASK US ABOUT MOBILE DEVICE SECURITY SOLUTIONS
With mobile devices handling so much of the computing workload, they must protect these devices properly.
Contact Wahaya IT to discuss mobile security and management solutions. Click here to get in touch.
Article used with permission from The Technology Press.