The Cybersecurity Attack Vector That’s Always On

Before I quote any 3rd party to convince you of my position, let’s start with some questions.  Answer from your point of view, assuming you have a mobile phone and at least 1 computer.

Which one travels the most and is on the greatest number of networks?

Which one has security software installed on it that creates reports sent to you and/or an administrator?

Which one is left turned on the most?

Which one gets used for transactions, information sharing, and sits near you at meal time?

Which one has a camera that takes pictures and saves them to servers all over the world that you can’t even identify?

Am I done yet?

The amazing thing is that you aren’t done yet.  Despite all these known vectors in which a mobile phone can be attacked and controlled, our mobile devices are perhaps the least likely item that we pay for security service for.  They should be the one we pay the MOST for.

Now, some of the findings, care of our friends at Verizon, from the 2018 Data Breach Investigations Report.

"As mobile devices often provide privileged access to the enterprise environment and hold two-factor authentication credentials, these classes of malware and device-based attacks can result in more damage than adware or click fraud. The potential for these infections does exist, and a common vector is the use of phishing/SMiShing and other social attacks that entice the mobile user to download applications outside of official platform marketplaces."

Yet, some of you will continue to say, “my phone is safe-it hasn’t failed me, yet.”  If this is your position, then there is nothing to add to the conversation.  Cyber Pearl Harbor is in your future.

You don’t need a Cyber Pearl Harbor to invest in protection your assets and your devices.  Call us for help.

Share this post:

Leave a Reply

The Network Team