Mobile Device Threats

According to Michael Ogden in his recent article in PropertyCasualty 360, there are five mobile device threats and how to prevent them. 

Top threats:

  • Phishing Attacks - use deceptive sites or software programs that masquerade as legitimate ones to steal vital user information (user login credentials and credit card numbers)
  • Malware Infections - can steal data and eat up computing resources from mobile devises.  They can trigger users into taking actions that further compromise mobile devices.
  • Advanced Persistent Threats - are coordinated network attacks hackers use to gain access to an organization's network and data.
  • Untested Mobile Apps - beware of downloading apps from a third-party source instead of downloading from regulated app stores.
  • Outdated Operating Systems - leaves your mobile devise vulnerable to malware and other security threats.

How to avoid these threats according to Comodo Threat Research Labs:

  • Avoiding connecting to unsecured Wi-Fi networks, such as public Wi-Fi hotspots;
  • Downloading apps from trusted sources, such as the Google Play Store and iOS App store, and not from unreliable third-party sources;
  • Being wary of unsolicited calls or messages; and
  • Mitigating mobile device attacks from penetrating the corporate environment, which provides the controls needed to secure, manage and monitor all the employe­e-owned mobile devices that access critical business data.

Keep these tips in mind to help you maintain your mobile device.