Don’t Let Hackers Outsmart Your Smartphone

by | Aug 6, 2019

In our last few posts, we’ve provided some helpful tips while traveling and using Public Wi-Fi. Today, I would like to discuss smartphones.

There are many flavors of smartphones available running a variety of operating system. However, for today’s discussion, it will be more focused on “The Big 2,” Android and iOS (Apple).

Did you know that over 80% of the world’s web browsing is done on a mobile device? 

…Over 80%!

Guess who DOES know this statistic? 


Now, let me ask you a few questions:

When you download an “app,” do you take a minute to verify the Publisher/Developer?

When you browse a website, do you notice and respond to a site that is not secure, or has the “unlocked” icon?

Do you have the ability to remotely wipe your device in the event it is lost or stolen?

Do you have a method for detecting malware?

Many companies invest significantly in their network and application security, but then ignore or discount their mobile security. That is why bad actors target it. 

Just like in most scenarios, they look for your area of weakness then exploit it. Mobile Device Management (MDM) needs to be a tool in your Cybersecurity tool belt. 

MDM goes beyond good habits and user behavior and provides that extra layer of protection. Also, newer technology allows for control of the device without infringing on privacy or interrupting the user. 

We encourage you to be very intentional with your apps and browsing, and as always, have a good backup provided by your phone carrier.