Skip to Main Content

Keeping Mobile Devices Safe From Hacking

Thursday, September 1, 2016

Hackers can use malicious apps, unsecured networks or a vulnerability in an outdated OS to access any of the information on a mobile device.

As smartphones and other mobile devices have advanced and added conveniences for users, they have also become more susceptible to cyber attacks. And, if you don’t take steps to protect the personal or work information on your devices, you could be exposed to considerable risks.
A hacker can attack a smartphone or other mobile device without the owner’s knowledge and gain access to his or her messages, contacts, emails and even his or her location, based on GPS data. Additionally, individual cyber attacks are beginning to exponentially increase in frequency. Although a few years ago hackers mainly targeted retailers and health care organizations, they now see individuals as a key target.
To protect the information on your devices, you need to know the main vulnerabilities that hackers can exploit to their advantage:

  • Malicious apps: Many apps ask for more access to your device than is required. When you download an app, make sure to check how much access it has, and that the app has been made by a reputable developer.

Additionally, always download an app from your device manufacturer’s official store. Apps downloaded from a website or mobile link are much more likely to contain malicious code.

  • Unsecured networks: Hackers can use public Wi-Fi and other unsecured networks to see all of your internet usage. Avoid using public networks when possible, and disconnect from a network immediately if your device prompts you with an insecure network notification.
  • Outdated operating systems (OSs): If your device is running an outdated OS, it isn’t receiving new security measures from the device manufacturer. Any mobile device that runs on an outdated OS will be exposed to more high-risk vulnerabilities as it becomes more outdated. Frequently check your device for updates, and install them as soon as possible.

Real-life Case Study

Jason, an outside sales representative, was traveling for business. During a layover at the airport, he decided to use his work phone to browse the internet. When Jason found that he couldn’t access the airport’s Wi-Fi for free, he found another open network that he could connect to.
While on the open network, Jason checked his work email and browsed some websites online, including his personal bank account. When Jason returned to his local office the next day, many of his co-workers told him that they had received suspicious emails that claimed to come from Jason himself. Additionally, Jason found that several strange charges had been made to his bank account since he had browsed on the open network at the airport.
Fearing that his work phone had been hacked, Jason decided to approach his manager. After an investigation, it was discovered that a hacker had used the open network at the airport to access Jason’s work contacts and bank account. Since then, he has been careful to only use secure Wi-Fi networks and to keep his phone’s OS updated.

© 2016 Zywave, Inc. All rights reserved.

Material posted on this website is for informational purposes only and does not constitute a legal opinion or medical advice. Contact your legal representative or medical professional for information specific to your legal or medical needs.

Get Started

Let Your Aspirations Set the Agenda

Grow with who you know. Reach out to us today and start the conversation, so you’re better protected and prepared for what comes next.

Talk to an Advisor

man looking left