There are over 17 billion smartphones in the world today, and that number grows by the day. Thanks to technological progress, there is hardly anyone these days who doesn’t have one mobile phone or an Internet of Things (IoT) device. This is provided by the growing connectivity, but these devices are subject to various security threats as well. The protection of mobile devices will need to be well-informed on attacks and have appropriate security protocols in place. There are multiple options available for a mobile phone, but it can be confusing and confusing with all these technological possibilities. These are the top six cell phone makers in the world: Apple, Samsung, Google, Sony, Motorola, and Huawei. (Adams, 2022) There are two kinds of operating systems – iOS by Apple and Android by Google. Android has different versions, and they might vary between manufacturers. We cannot even appreciate how many security risks there are to mobile devices if we don’t know what mobile devices are. Mobile computing units, which have all the features of a traditional computer unit, mobile computing units are mobile devices that can be used, managed, and provided with services and applications. (Rouse, 2012) If protests over the impact of technology on social and verbal capabilities are nothing new, smartphone hacking is an even bigger problem that is often ignored. Threat actors are busting people’s computer walls and tampering with gadgets as the public becomes ever more dependent on the pocket-sized electronics being held in their hands. Cybercrimes on big businesses aren’t going to go away, most cybercriminals can cause quite a negative impact on the lives of individuals through a mobile device. Every month, there are 1.8 million mobile cyber-attacks and this number will grow each year as more individuals get mobile phones. (Petrosyan, 2024)
Computer, tablets and private mobile phone users (who all have permanent internet connection) have created the information age. COVID-19 makes the shift towards more remote work in our societies all the more stark, as it also makes it all the more visible how much of our lives we live on technology. Few employers would have been so wary of employees working from home 10 years ago. (Hamingson, 2023) With more companies allowing employees to work from home, it is not without problems of their own. As we are becoming more dependent on mobile devices, companies will need to develop tools to shield those devices from hackers. These devices were before being sheltered from attacks from the enterprise’s on-premises security, but now they are not protected by those safeguards. Malware and viruses are not just about computers and wired networks as people believe. The mobile devices are just as much at risk of hacking as your PC at home if you don’t have the security options selected. When you’re on a public network, hacking will be most likely, and possibly simple. Everywhere in public your phone and everything on it gets attacked using the free Wi-Fi. Data like bank accounts, contacts, SMS, photos, camera and microphone are just a few examples of data that can be affected. Most people have everything about their lives in these things. ‘Facing advantage of these vulnerabilities, they can then be intercepted and unrecognized monitoring the network traffic which could acquire data of importance and confidential.’ (Rawat, 2023) Mobile-specific cyberattacks are just like computer, server and business network breaches. Every time hackers devise new ways to hijack mobile phones with malware. Most malware installations are almost always blamed on user mistakes. It’s ignorance unfortunately, and ignorance is what risks so many users and gadgets if you don’t know how viruses and malware get to their device. Hackers can access your machine if you leave Bluetooth on, connect to public Wi-Fi, or download files and apps without verifying their authenticity. Such attacks are often carried out very quickly and covertly so that the target doesn’t realize he’s been attacked until it’s too late.
Phishing attacks are the most common kind of cyber-attacks that are happening today. Most of the time we experience this attack working at a company. “At least most phishing attacks starts from mobile device as they are on the go” (Kaspersky, 2024) Phishing attacks can come to your mobile device in the form of text message, phone call, email and even a website. When reading from a mobile phone, users may not always know who actually sent the email. This is so the users are not getting the impression that this is an actual email and click on a link or attachment. The receiver of a text message can click a link even if the author is unknown. This might redirect the visitors to a fake website that gathers your bank or some other personal data.
Some strategies can be applied to successfully guard mobiles from attacks. Above all, make sure to implement multi-factor authentication (MFA) where users are required to complete multiple forms before their device is opened. This can be a fingerprint and a passcode, for instance. It could be software too such as Microsoft Authenticator app for access to corporate data. Change your password often and use two-factor authentication on all devices with it. Using device encryption also protects the sensitive information on a mobile phone should it be lost or stolen. (Phifer, 2013) In order to ensure data transmission does not get eavesdropped, encourage use of secure Wi-Fi connections or Virtual Private Networks (VPNs). By downloading good mobile security applications such as antivirus or antimalware, they can help you spot suspicious activity and block it. Only downloading apps from Google Play Store or the Apple Store because those apps are vetted by those stores. And that’s not to say they are necessarily virus free; apps have gone on those two platforms before that were malware. Debugging and strengthening security requires updates regularly on mobile operating systems and applications. You must change the phone after three years as after 3 years, they will no longer be updated with the firmware version. Users can wipe confidential information or lock devices remotely in case of theft or loss, with remote wipe and lock turned on. Adding more mobile device security to the equation, preventive measures include tight passwords, educating users about the threat of phishing and social engineering, regularly back up data and implement mobile device management in case of a company’s bring your own device (BYOD) policy.
Mobile phones offer unprecedented connectivity and convenience, but there are a number of very real security risks that must be considered. With mobile devices increasingly being used for everything from communications to payments to data access, protecting mobile devices from cyberattacks must be vigilant. Because the mobile industry is very popular, hackers are constantly reimagining ways to exploit vulnerabilities in mobile devices, which means they’re an easy target for attacks. Therefore, to avoid being a victim of cyberattacks, you have to be very alert. Follow the emerging threats, use secure browsing, implement encryption and multi-factor authentication. Replacement of smartphones every 3 years for firmware features. Software patches and security updates are also done regularly to improve security holes and strengthen the overall mobile devices. All in all, we are living in a connected world where you have to be very careful about your mobile devices and your personal information, which is important for the security of your mobile phone.
References
Taylor, P. (2023, July) .Phone subscriptions worldwide 2028, Statista. Retrieved on March 3, 2024 from https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/.
Shank, S. (2023, Mar. 28). How to Secure Your Mobile Device: 8 Tips for 2023. Retrieved on March 3, 2024 from https://www.tripwire.com/state-of-security/secure-mobile-device-six-steps.
Osborne. C. (2023, Oct. 28). 9 top mobile security threats and how you can avoid them. Retrieved on March 3, 2024 from https://www.zdnet.com/article/9-top-mobile-security-threats-and-how-you-can-avoid-them/.
Beal. V. (2022, August 30). What are Different Types of Mobile Devices?. Retrieved on March 10, 2024 from https://www.webopedia.com/reference/mobile-os/.
Adams. H. (2022, September 29). Top 10 phone manufacturers. Retrieved on March 14, 2024 from https://manufacturingdigital.com/smart-manufacturing/top-10-phone-manufacturers.
Laricchia. F. (2023, March 10). Forecast number of mobile devices worldwide from 2020 to 2025 (in billions)*. Retrieved on March 11, 2024 from https://www.statista.com/statistics/245501/multiple-mobile-device-ownership-worldwide/.
Phifer. L. 2013, March 27). How mobile device encryption works to protect sensitive data. Retrieved on March 20, 2024 from https://www.techtarget.com/searchmobilecomputing/tip/How-mobile-device-encryption-works-to-protect-sensitive-data.
Kaspersky. (n.d.) Top 7 Mobile Security Threats. Retrieved on March 24, 2024 from https://www.kaspersky.com/resource-center/threats/top-seven-mobile-security-threats-smart-phones-tablets-and-mobile-internet-devices-what-the-future-has-in-store.
Hamingson. N. (2023, October 24). Communication Technology and Inclusion Will Shape the Future of Remote Work. Retrieved on March 24, 2024 from https://www.businessnewsdaily.com/8156-future-of-remote-work.html.
Barrett. B. (2019, October 25). How 18 Malware Apps Snuck Into Apple’s App Store. Retrieved on March 24, 2024 from https://www.wired.com/story/apple-app-store-malware-click-fraud/.
Petrosyan. A. (2024, February 6). Number of mobile cyber attacks against users worldwide from January 2020 to December 2022. Retrieved on March 24, 2024 from https://www.statista.com/statistics/1305965/mobile-users-cyber-attacks/.