Monday, January 18, 19:26
Home security Companies: How to deal with the threat of mobile malware?

Companies: How to deal with the threat of mobile malware?

mobile malware

Increased use personal phones for work and continuous development of mobile malware increase the risk to organisms and Companies.

The mobile phone is used everywhere both personally and professionally. Many organizations have policies BYOD, which allow and encourage employees to use their own personal cell phones at work.

Many of these devices have access in corporate networks and sensitive data, however many may not be as protected or secure as Appliances the company's.

A recent report examines the use of mobile devices in corporate networks and the dangers of mobile malware. The report also provides advice on protection organizations from mobile malware and threats.

The report also cites the findings of previous studies. One of them discovered that 80% of employees use their personal mobile phones for work and another found that the 70% of businesses allow employees to bring their own devices to work.

At the same time, malware is constantly growing (750 million malware in more than 10 billion attacks). Mobile malware makes up a small percentage of this total, however it may be very dangerous because they can access sensitive people information.

In particular, credit card data, personal information and more can be obtained through applications Software-as-a-Service (SaaS) used in mobile phones.

Mobile devices can open the door to many threats that are mainly related to mobile malware.

Most mobile devices have one large number of applications, including email, SaaS-based applications, cloud storage, social media, games and news applications.

The more applications there are, the more updates are needed, and the more accessible protocols there are. In addition, the more time the user spends on the device, the greater the risk of infection from some mobile malware or other threat.

mobile malware

More attack opportunities

The growing number services cloud on mobile devices can give more opportunities for theft data or for unauthorized access to sensitive information.

Attackers use various ways to infect employees' devices with mobile malware and gain access to corporate networks.

Mobile devices are equipped with certain features such as cameras and microphones that can be easily exploited by hackers for malicious purposes. A compromised cell phone can be used to take photos, sensitive documents, presentations, etc.

Personal vs professional use

Users can easily combine personal and business contacts and other information. This means that mistakes can be made, such as sending sensitive corporate data to the wrong person or post on personal social media.

In order for organizations to be protected from mobile malware and related threats they must follow the following tips:

1. Limit the use of personal cell phones

One of the most effective ways to protect the work environment is to limit the use of personal cell phones for work-related purposes.

2. Monitor the network

Be sure to use network detection and response (NDR) solutions to analyze mobile traffic.

3. Check BYOD policies

Make sure BYOD policies are strict enough. It should be clear which applications are allowed and which are not and how to use them properly.

4. Mobile device management

Implement strict policies for Appliances. Make sure there are policies that lock devices, secure VPN access, etc.

5. Multi-Factor Authentication (MFA)

This method of protection is very common and is necessary as an extra barrier for hackers.

6. User training

Users are the first line of defense. Training must be regular, because hackers and creators of mobile and other malware are constantly improving their methods.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Digital Fortress
Digital Fortresshttps://www.secnews.gr
Pursue Your Dreams & Live!

LIVE NEWS

Android: How to make Signal the default messaging app

Signal is a popular encrypted messaging application that focuses on privacy. It is an alternative to ...

Google Cloud: We use some SolarWinds, but we were not affected by the hack

Google Cloud CISO Phil Venables has revealed that the cloud uses software from the vendor, SolarWinds, but states that the use ...

Scotland Environment Service: ransomware continues to affect us

The Scottish Environmental Protection Agency (SEPA) has confirmed that it was hit by a ransomware attack last month and continues to face ...

Backdoors and vulnerabilities were discovered in FiberHome routers

Backdoors and other vulnerabilities have been discovered in the firmware of a popular FiberHome FTTH ONT router. FTTH ONT stands for Fiber-to-the-Home Optical Network ...

GitHub apologizes to an employee who fired! What happened;

GitHub has admitted that it was wrong to fire a Jewish official who made "anti-Nazi" comments about the Capitol riots.

By 2030 AI will replace the people of cybersecurity

Security company Trend Micro recently conducted a new survey that reveals that more than two-fifths (41%) of IT leaders believe ...

Chinese Winnti APT targets organizations in Russia and other countries!

Security researchers at Positive Technologies have uncovered a series of attacks carried out by a Chinese APT hacking team targeting organizations in Russia ...

Silicon Valley is investing a huge amount of money in India

From March to November, even when COVID-19 destroyed economies around the world, the richest man in India ...
00:02:01

Microsoft, Salesforce, Oracle are designing a digital vaccination passport

A Covid digital vaccination passport is being developed jointly by a team of health and technology companies, as well as governments, airlines and ...

Google removes Chrome Sync from third-party browsers

Google says it will block the use of private Google APIs by third-party Chromium web browsers after discovering that ...