CONNECT. CONVERSE. COLLABORATE.

News, articles and updates to keep you informed

Can your mobile phone defend against an online attack?

Article by: Linten Technologies Ltd

Every 19 seconds, an SME is successfully attacked by cyber-criminals in the UK. Some of these attacks will involve hacking mobile phones that have access to business accounts. By now, most businesses understand the value of investing in robust anti-virus software for their desktop devices, but there is a wealth of business data going unprotected on mobile phones.

It is becoming more common for SMEs and charities to let employees ‘bring your own device’. This is a trend that allows teams to connect personal devices to organisational networks and access company systems and accounts. Therefore, mobile phones are becoming devices where personal data meets business data. Another reason why cyber-criminals are turning their efforts towards hacking phones.

What are the Online Threats against Mobile Phones?

Phishing and Smishing – These are social engineering attacks that trick users into giving away credentials, often by leading them to a fake website. They can also encourage users to download a file they believe to be legitimate but contains malicious software. This will then infect the mobile device causing damage.

Hidden apps – Hiding in plain sight, malicious applications have been known to be available to download from official app stores and promoted on social media platforms. This is because they are hidden within what appears a genuine application. Once installed onto a mobile phone, they can run intrusive adverts, collect data through spyware, or slow the device down.

Public Wi-Fi and Network Spoofing – It is easy to be tempted to access public Wi-Fi when you are on the go. We often do so without thinking, and that is why hackers have been known to use this to their advantage. Dangers include the distribution of malware to connected devices and intercepting sensitive data with a ‘man in the middle’ attack.

Network spoofing is where cyber-criminals set up fake access points that often resemble public Wi-Fi connections such as coffee shops or libraries. Once a device is connected, they can watch what the user is doing and steal important data such as passwords.

Build your Mobile Phone’s Resilience

Every mobile phone should be protected. Whether it is a business device, personal or used for both, installing threat defence will help to keep your sensitive data safe.

Article by Linten Technologies Ltd


Mr R Bennett & Mrs H Bennett (Partners), 481 Chester Road, Manchester, M16 9HF. T 0161 823 1384
Copyright © 2024. All Rights Reserved - The Legal Information.