4.03.2024 Law in media
Cyber Attack on a Corporate Smartphone. How to Protect Yourself
KrzysztoF
Internet-connected mobile devices are an attractive target for cybercriminals. The key to protecting sensitive business data is employee awareness, hardware solutions, and appropriate software. This mini-guide provides a quick overview of how to protect each of these areas.
According to the "Cybersecurity of Endpoint Devices Post-2022" report by Digital Poland, attacks on the public sector infrastructure increased by 500%, and 58% of organizations reported security breaches. Attacks, fraud, and scams—often aided by artificial intelligence—are expected to rise in 2024. Mobile users, particularly those using Android, which holds 72% of the market, are especially vulnerable.
Most Common Cyber Threats
The most common cyber threats to mobile devices include:
- Phishing and Pharming: pretending to be a trusted source to obtain confidential information.
- Malware: malicious software, viruses, and Trojans that enable unauthorized access to devices.
- Ransomware: software that locks access to systems and demands a ransom for unlocking.
- Man-in-the-Middle: intercepting and modifying network traffic in unsecured Wi-Fi networks.
- Juice Jacking: data theft from smartphones via fake chargers in public places.
"In the context of mobile devices for business, it’s essential to alert employees to follow basic security principles. First, only download apps from reputable stores—Google Play for Android. Second, avoid suspicious links, even from known contacts. Third, verify sender email addresses carefully," advises Monika Czech, KNOX Focus Sales Specialist at KOMSA Poland. "Cybercriminals can be very creative. For example, a phishing email may come from a domain ending in .corn instead of .com—easy to miss on first glance. Fourth, use password managers and create strong, unique passwords for each service. In Poland, the most popular password is still `123456.` Lastly, enable two-factor authentication. This is a good place to start individually."
Hardware and Software Protections
In addition to best practices, companies should use both hardware and software solutions to secure mobile devices. Reputable manufacturers offer built-in security measures at the chipset level, which protect against unauthorized OS rollbacks and encrypt sensitive data.
Additionally, specialized software for IT administrators (Mobile Device Management) allows management of device fleets, detection of tampering attempts, and other security measures.
"While a private user may benefit from good practices and antivirus software, businesses should also consider systemic solutions. Training staff alone is insufficient. After all, an organization`s reputation and potential financial losses are at stake," says Monika Czech of KOMSA Poland. "Comprehensive protection options are available on the Polish market, such as Samsung Knox, which offers both hardware and software security. The effectiveness of this security platform is underscored by the fact that Poland`s Internal Security Agency (ABW) has certified it for cryptographic protection, covering selected security mechanisms."
Mobile device cyber threats pose an increasing challenge for businesses. With attacks expected to rise in 2024, it is crucial to implement appropriate protections at both user and organizational levels.
Source: Newseria Lifestyle
COMMERCIAL BREAK
New articles in section Law in media
How South Asian Governments Manipulate Media. IFJ Report
Krzysztof Fiedorek
South Asia faces significant challenges in maintaining democracy and press freedom. The latest report from the International Federation of Journalists (IFJ), "Artificial Independence: The Fight To Save Media and Democracy," highlights the growing threats faced by journalists, including violence, financial pressures, and censorship.
Unsolved Journalist Murders: CPJ Report 2024
KFi
Haiti and Israel have topped the latest report by the Committee to Protect Journalists (CPJ) on impunity in journalist murders. Worldwide, 80% of cases remain unsolved. The report explores why those who kill journalists evade accountability, highlighting the countries leading this grim statistic and its impact on press freedom.
Online Hate in Numbers. What Do We Think About Offensive Comments?
KFi
Nearly 70% of adults have encountered online hate. The group most affected includes individuals aged 18–24, with 81% reporting exposure to hateful content - according to the report "Hate on the Internet," prepared by the polish Foundation "W zgodzie ze sobą" in cooperation with Maison&Partners and the Ariadna research panel.
See articles on a similar topic:
Illusory Security. Small and Medium Enterprises Easy Targets for Cybercrime
KF
35% of micro, small, and medium enterprises (SMEs) fear the theft of their employees' personal data. This comes from research conducted on behalf of ChronPESEL.pl and the National Debt Register of Poland.
Local Media in Poland - Announcements
Bartłomiej Dwornik
Research by ComPress Agency, conducted among journalists in 2001, indicates that only 7 percent of them believe that PR specialists and press spokespeople understand journalists' needs well.
Deepfake. A Powerful New Weapon in The Information War
Krzysztof Fiedorek
One of the newest threats to the credibility of information is deepfake technology. Deepfake is a type of false video or audio material where the person in the recording appears to speak or behave in a way that does not align with reality.
Cyberwarfare on the Internet. The ESET Report
KF
Governments, corporations, and even the education sector are becoming targets of advanced cyber attacks. The report for the period from October 2023 to March 2024, prepared by ESET, sheds light on the intensification of activities by Advanced Persistent Threat (APT) groups, which conduct espionage, sabotage, and destabilization operations in key sectors on behalf of states.