menu
Weekly Online Magazine
ISSN 2544-5839
zamknij
Work In Media image

4.03.2024 Law in media

Cyber Attack on a Corporate Smartphone. How to Protect Yourself

KrzysztoF

Internet-connected mobile devices are an attractive target for cybercriminals. The key to protecting sensitive business data is employee awareness, hardware solutions, and appropriate software. This mini-guide provides a quick overview of how to protect each of these areas.
Poczytaj artykuł wydanie polskie w wydaniu polskim

Cyber Attack on a Corporate Smartphone: How to Protect Yourselfillustration: bing.com/create

According to the "Cybersecurity of Endpoint Devices Post-2022" report by Digital Poland, attacks on the public sector infrastructure increased by 500%, and 58% of organizations reported security breaches. Attacks, fraud, and scams - often aided by artificial intelligence - are expected to rise in 2024. Mobile users, particularly those using Android, which holds 72% of the market, are especially vulnerable.

Most Common Cyber Threats


The most common cyber threats to mobile devices include:

  • Phishing and Pharming: pretending to be a trusted source to obtain confidential information.
  • Malware: malicious software, viruses, and Trojans that enable unauthorized access to devices.
  • Ransomware: software that locks access to systems and demands a ransom for unlocking.
  • Man-in-the-Middle: intercepting and modifying network traffic in unsecured Wi-Fi networks.
  • Juice Jacking: data theft from smartphones via fake chargers in public places.

"In the context of mobile devices for business, it’s essential to alert employees to follow basic security principles. First, only download apps from reputable stores - Google Play for Android. Second, avoid suspicious links, even from known contacts. Third, verify sender email addresses carefully," advises Monika Czech, KNOX Focus Sales Specialist at KOMSA Poland. "Cybercriminals can be very creative. For example, a phishing email may come from a domain ending in .corn instead of .com - easy to miss on first glance. Fourth, use password managers and create strong, unique passwords for each service. In Poland, the most popular password is still `123456.` Lastly, enable two-factor authentication. This is a good place to start individually."


Hardware and Software Protections


In addition to best practices, companies should use both hardware and software solutions to secure mobile devices. Reputable manufacturers offer built-in security measures at the chipset level, which protect against unauthorized OS rollbacks and encrypt sensitive data.

Additionally, specialized software for IT administrators (Mobile Device Management) allows management of device fleets, detection of tampering attempts, and other security measures.

"While a private user may benefit from good practices and antivirus software, businesses should also consider systemic solutions. Training staff alone is insufficient. After all, an organization`s reputation and potential financial losses are at stake," says Monika Czech of KOMSA Poland. "Comprehensive protection options are available on the Polish market, such as Samsung Knox, which offers both hardware and software security. The effectiveness of this security platform is underscored by the fact that Poland`s Internal Security Agency (ABW) has certified it for cryptographic protection, covering selected security mechanisms."

Mobile device cyber threats pose an increasing challenge for businesses. With attacks expected to rise in 2024, it is crucial to implement appropriate protections at both user and organizational levels.

Source: Newseria Lifestyle

Share the article:

dodaj na Facebook prześlij przez Messenger dodaj na Twitter dodaj na LinkedIn

COMMERCIAL BREAK
Work In Media

New articles in section Law in media

Dietary supplement ads in Poland. Who keeps influencers in check?

Newseria, KFi
One in three Polish internet users considers influencer recommendations when deciding on medicines and dietary supplements. Although promotion of such products is regulated, there are still cases of advertising that skirt the law.

SEO Poisoning. Hackers Use Search Engines to Target Businesses

Piotr Rozmiarek
Search engines help us quickly find information, but they can also be used by cybercriminals. SEO poisoning is a tactic where attackers manipulate search engine rankings to place harmful websites at the top of search results.

Phishing in the Cryptocurrency Industry. Fake Recruitments Steal Data

Piotr Rozmiarek
Security researchers have detected a social engineering campaign targeting job seekers in the Web3 industry. The attack aims to conduct fake job interviews via a meeting application that installs information-stealing malware.


See articles on a similar topic:

Data for Benefits: What Encourages Sharing Personal Information Online

Krzysztof Fiedorek
Most Poles are aware of the value of their personal data and do not share it without reason. However, one in five is willing to share data in exchange for benefits, and 16% of us do not remember if we have done so. These are the results of a study conducted by ChronPESEL.pl and the National Debt Register under the patronage of the UODO.

Sharenting, or Photos of Children Online. IRCenter Study

KrzysztoF
Parents who are internet users eagerly share information about their children online. They publish images, personal information, or life events, often unaware of the risks. Research company IRCenter examined this area of Polish internet activity.

GDPR in Media. Regulations Complicate Campaign Planning and Execution

BARD
Most Polish news portals and online stores have adopted consent mechanisms designed in a way that makes it hard to refuse consent

Illusory Security. Small and Medium Enterprises Easy Targets for Cybercrime

KF
35% of micro, small, and medium enterprises (SMEs) fear the theft of their employees' personal data. This comes from research conducted on behalf of ChronPESEL.pl and the National Debt Register of Poland.

More in the section: Law in media

Work in media

United States
New York • Washington DC • Los Angeles • Chicago • Houston • Phoenix • Philadelphia United Kingdom
London • Birmingham • Manchester • Liverpool • Glasgow • Edinburgh Canada
Toronto • Ottawa • Montreal • Calgary Australia
Sydney • Melbourne • Brisbane • canberra Ireland, New Zealand, India

advertisement

Flying Tiger




community

Facebook LinkedIn X Twitter TikTok Instagram Threads Youtube Google News Blue Sky Social RSS

Reporterzy.info - online media studies magazine. The world of communication from the inside. Media, journalism, PR and marketing. Data, reports, analyses, advice. History and market, law, photography, job offers.



Reporter shopping

Reporter shopping

Affordable laptops, notebooks and netbooks
Affordable laptops, notebooks and netbooks
for writing
Digital SLR and compact cameras
Digital SLR and compact cameras
for photographers
Books and e-books about media
Books and e-books about media
for reading
Video drones and flying cameras
Video drones and flying cameras
for pilots
Gimbals for stabilizing video
Gimbals for stabilizing video
for those on the move
Software and apps for creative work
Software and apps for creative work
for digital creators
More occasions

follow us 👉 on Youtube
Watch more 👇
#59sec REPORT SHORTS
Read books and e-books

Read books and e-books

Okładka Understanding Media: The Extensions of Man
Understanding Media: The Extensions of Man
Okładka Media Control. The Spectacular Achievements of Propaganda
Media Control. The Spectacular Achievements of Propaganda
Okładka Social Media Marketing All-in-One For Dummies
Social Media Marketing All-in-One For Dummies
Okładka Mass Communication: Living in a Media World
Mass Communication: Living in a Media World
Okładka Beyond The Feed: A Social Media Success Formula
Beyond The Feed: A Social Media Success Formula
Okładka Trust Me, I`m Lying: Confessions of a Media Manipulator
Trust Me, I`m Lying: Confessions of a Media Manipulator
more books and e-books

Reporterzy.info

More about us

Our tools and services

Contact


© Dwornik.pl Bartłomiej Dwornik 2oo1-2o25