Most, if not all business professionals use smartphones some even have two, one specifically for business purposes and the other personal.

With greater use of mobile devices comes a greater chance of malware attacks. MacAfee identified an increase in widespread and more sophisticated mobile malware attacks. According to their Labs Threats Report, mobile malware attacks have almost doubled since 2016.

 

How do mobile attacks occur?

Similar to PC Malware attacks, hackers send malicious links and attachments via email or text. These links when pressed then give the hacker access to your device and all the information on it, such as login details bank information.

Apps are also used to hack devices, cybercriminals are highly skilled and often design apps, that’s on the surface look legitimate. The apps are often free and maybe for a game or utility app to improve productivity. When you download those apps, you are opening yourself up for a cyber-attack.

 

How to reduce the risk of mobile apps?

1) Don’t open suspicious links

Do not click on suspicious-looking links or download attachments from an unknown email. If an email is from someone you know, but you were not expecting a link or attachment give them a call to double check it is genuine.

 

2) Have a list of approved apps.

If you offer your team members work phones have a ‘list of approved apps’ this reduces the chance of illegitimate apps being downloaded.

If individuals want to download apps that are not on the approved list, they must obtain permission. Ensure there is a clear procedure in place to request permission.

 

3) Introduce cybersecurity monitoring technology

Make sure your firm has cybersecurity monitoring tools to check for signs of unusual activity.

 

4) Train your team

Train your team, so they can spot suspicious emails and avoid clicking on them. It is worth having regular training, the cyber world is forever evolving, so it is vital to ensure staff are trained regularly.

 

5) Assign the role

Assign someone in your team the role of cybersecurity monitor. This means they are accountable for hacks and will know exactly what steps to take on a corporate level to ensure it doesn’t happen again.

 

Did you find this blog useful? Sign up for our newsletter (here) to receive fresh content directly to your inbox once a month.

 

Please follow and like us: