4.03.2024 Law in media
Cyber Attack on a Corporate Smartphone. How to Protect Yourself
KrzysztoF
Internet-connected mobile devices are an attractive target for cybercriminals. The key to protecting sensitive business data is employee awareness, hardware solutions, and appropriate software. This mini-guide provides a quick overview of how to protect each of these areas.
Poczytaj artykuł
According to the "Cybersecurity of Endpoint Devices Post-2022" report by Digital Poland, attacks on the public sector infrastructure increased by 500%, and 58% of organizations reported security breaches. Attacks, fraud, and scams—often aided by artificial intelligence—are expected to rise in 2024. Mobile users, particularly those using Android, which holds 72% of the market, are especially vulnerable.
Most Common Cyber Threats
The most common cyber threats to mobile devices include:
- Phishing and Pharming: pretending to be a trusted source to obtain confidential information.
- Malware: malicious software, viruses, and Trojans that enable unauthorized access to devices.
- Ransomware: software that locks access to systems and demands a ransom for unlocking.
- Man-in-the-Middle: intercepting and modifying network traffic in unsecured Wi-Fi networks.
- Juice Jacking: data theft from smartphones via fake chargers in public places.
"In the context of mobile devices for business, it’s essential to alert employees to follow basic security principles. First, only download apps from reputable stores—Google Play for Android. Second, avoid suspicious links, even from known contacts. Third, verify sender email addresses carefully," advises Monika Czech, KNOX Focus Sales Specialist at KOMSA Poland. "Cybercriminals can be very creative. For example, a phishing email may come from a domain ending in .corn instead of .com—easy to miss on first glance. Fourth, use password managers and create strong, unique passwords for each service. In Poland, the most popular password is still `123456.` Lastly, enable two-factor authentication. This is a good place to start individually."
Hardware and Software Protections
In addition to best practices, companies should use both hardware and software solutions to secure mobile devices. Reputable manufacturers offer built-in security measures at the chipset level, which protect against unauthorized OS rollbacks and encrypt sensitive data.
Additionally, specialized software for IT administrators (Mobile Device Management) allows management of device fleets, detection of tampering attempts, and other security measures.
"While a private user may benefit from good practices and antivirus software, businesses should also consider systemic solutions. Training staff alone is insufficient. After all, an organization`s reputation and potential financial losses are at stake," says Monika Czech of KOMSA Poland. "Comprehensive protection options are available on the Polish market, such as Samsung Knox, which offers both hardware and software security. The effectiveness of this security platform is underscored by the fact that Poland`s Internal Security Agency (ABW) has certified it for cryptographic protection, covering selected security mechanisms."
Mobile device cyber threats pose an increasing challenge for businesses. With attacks expected to rise in 2024, it is crucial to implement appropriate protections at both user and organizational levels.
Source: Newseria Lifestyle
COMMERCIAL BREAK
New articles in section Law in media
SEO Poisoning. Hackers Use Search Engines to Target Businesses
Piotr Rozmiarek
Search engines help us quickly find information, but they can also be used by cybercriminals. SEO poisoning is a tactic where attackers manipulate search engine rankings to place harmful websites at the top of search results.
Phishing in the Cryptocurrency Industry. Fake Recruitments Steal Data
Piotr Rozmiarek
Security researchers have detected a social engineering campaign targeting job seekers in the Web3 industry. The attack aims to conduct fake job interviews via a meeting application that installs information-stealing malware.
SLAPP Lawsuits in Europe. How Journalists and Activists Are Silenced
Krzysztof Fiedorek
The number of strategic lawsuits aimed at intimidating journalists, activists, and civil society organizations is increasing in Europe. According to the CASE SLAPPs Report 2024, as many as 1,049 such cases were identified between 2010 and 2023.
See articles on a similar topic:
How to Detect Pegasus on Your Phone and Protect Against Spying
RINF
The nature of spyware is to remain as hidden as possible, making it difficult to detect on a device. However, some mechanisms can help verify if a smartphone has been compromised.
Local Media in Poland - The Press Owner Influence
Bartłomiej Dwornik
The editor-in-chief, according to the provisions of the Press Law, should be responsible for the content of the materials prepared by the editorial team as well as for the editorial and financial matters of the editorial office. This is the theory.
Recognizing Fake News. Technologies for Creating False Information
BARD
Artificial intelligence is increasingly used to fake information. Software now allows manipulation of public appearances by politicians. Bots are also used more often in Poland, with hate speech and trolling among the internet’s biggest threats.
Big Data in Poland. Companies Lack Ideas for Data Utilization
KF
Only 11 to 16 percent of domestic companies report using Big Data solutions, according to a survey by OVH and Intel. Among companies that have not yet used Big Data, only 2 percent plan to adopt this technology this year. Meanwhile, nearly all large and small companies admit to collecting customer data.