Protecting Your Mobile Device From Security ThreatsIT Resource
Bank accounts, sensitive emails, passwords and logins…How many times a day do you access sensitive data on your mobile device? In today’s world we’re always connected and always on, using smartphones much like mini computers – to connect to the internet, access banking information, and view other sensitive material. But, mobile devices are just as vulnerable to hacking, malware, and viruses as a traditional computer. In fact, the smartphone industry has seen a 2500% growth in malware attacks since 2010 and that number is only growing as more businesses adopt the BYOD (bring your own device) concept into the workplace.
What could happen if your mobile device were to become infected?
– Bank accounts, passwords, and secure documents could be compromised
– Basic information could be deleted
– Hackers could disable your phone or control it remotely
– Your device may become infected with malware or other malicious programs
– The device may need to be replaced
– An infected phone runs a great risk to your company’s network. The malicious app can run in the background and once the device is connected to the internet it creates a tunnel between the device, its connected network, and the hackers – allowing them access to your company servers
How do hackers and malware infect your mobile device?
– Lost or stolen: If you lose your mobile device, everything is free game if it falls into the wrong hands
– App stores: By making copies of legitimate apps and infecting them with malicious code
– Phishing: Creating fake versions of real websites then gathering your information
– Spyware: Collects information from you and delivers it directly to the malicious party
– Wifi networks: When logging on to a wifi network you may be exposing yourself to a malicious hacker who can collect all the data that goes between the wifi network and the server
– Opening files: Malicious files can be sent to your phone and when you click, you’re allowing the virus to spread throughout your device
– Public networks or hotspots: Logging on can give hackers the ability to snoop and collect your information
How to protect your mobile device
– Make sure your software is up to date
– Don’t access banking or sensitive sites over a public wifi connection
– Don’t jailbreak your phone
– Use a personal firewall or VPN software
– Use a pin or key lock, but use something other than 0000 or 1234, as those are the two most common pass codes
– Only download apps from reputable sites and carefully read reviews and permission requests
– Install a mobile security app
If you have mobile security questions or if your mobile device has been compromised, we’re here to help. Getting your network and employees set up with a secure platform is of the utmost importance. Contact us today to get all your devices on a secure network with the proper security settings.
IT Resource provides mobile security for clients in Grand Rapids, Muskegon, Holland, Fort Wayne, and South Bend. See how we can help you with your security and compliance needs.