top of page

The World is Going Mobile, Are Your Devices Protected?



It's 2019 and it's safe to assume that your mobile device has become a main part of your everyday life. Whether it's being used to browse the internet, use mobile banking, online shop, access important business documents or collaborate with teammates, mobile devices are near and dear to our everyday processes and tasks.


While cybersecurity is top of mind for many of you on your desktop and laptop computers, you may not be thinking about how you can be protecting your mobile devices in addition to your computers. As users have begun using mobile devices for increasingly important tasks, hackers have taken to the trend and are finding ways to hack into vulnerable devices.


Here are a few things to look out for when using your mobile devices:


  • Data Leakage - Data leakage may sound like a questionable term but it is quickly becoming one of the most worrisome threats to enterprise security in 2019. Data leakage is extra tricky because it's mostly and issue of users inadvertently making ill-advised decisions about which apps are able to see and transfer their information. The main challenge is finding ways to vet applications so that users (that's you!) do not give privileges to apps that are unworthy of such data. Users need to be extra cognizant of who they are trusting with their personal (and company) data and be diligent in not uploading company files or important personal information to non trustworthy applications or cloud resources.

  • Social Engineering - As users have moved to a more mobile centric lifestyle, hackers have unfortunately found ways to adapt their social engineering tactics. According to a 2018 report by FireEye, 91% of cyber crime starts with email. Another study done by IBM found that users are 3 times more likely to respond to a phishing attack on a mobile device than a desktop. Even when on a mobile device be sure to be cognizant of social engineering and do not click links, open attachments, or respond to suspicious emails.

  • Wi-Fi interference - A mobile device is only as secure as the network through which it transmits data. Public wi-fi has added a new complexity in network security. When using public wi-fi be sure to verify that you are on the correct network. Also be sure to use your companies VPN when accessing or working on confidential and important files or projects.

With complex threats to mobile devices increasing as we use our mobile devices more often, now is the time to begin looking at securing your phones and tablets. Here are a few ways in which you can begin implementing cybersecurity into your mobile usage.

  • Be on alert for increased phishing and social engineering emails attacks.

  • Be cautious of deals posted on social media and do not trust sources that have not been vetted or that are not from companies that you know you can trust.

  • Download antivirus software for all of your devices including smartphones and tablets

If you have any questions on how you can protect your mobile devices from security threats please feel free to reach out to us at letstalk@mapletronics.com.

bottom of page