There are a number of threats facing the unsuspecting mobile user.
Mobile Apps that Mine Corporate Information
Giving information to illegitimate apps can be a bigger risk than that posed by malware. Corporate users will often give these apps a wide range of information, data that may then be sent to remote servers across the globe. Cybercriminals and governments can then mine this data to gain access to corporate networks. This is a significant risk, largely because users don’t recognize the danger. To avoid these problems, users should give apps only the permissions they really need.
Tampered Mobile Apps from Untrusted Sources
Users may be tricked into installing apps from untrusted sources (instead of from official mobile application stores). Applications from unofficial stores do not go through Apple’s or Google’s verification process and therefore may include a tampered version of the original application, which includes malicious code. To avoid this attack vector, organizations should block their users from using unofficial applications.
Phishing Attacks
Phishing is the practice of sending emails that appear to be from a reputable company. The intent is to get individuals to reveal sensitive personal information, such as credit card numbers and passwords. As most mobile phones are always on, they are prime targets for phishing attacks. Many mobile users also often monitor their email constantly, opening messages as soon as they are received.
Android Fragmentation
Many millions of mobile devices use the Android operating system–and that is a part of the problem. The operating system is so popular that many companies incorporate it into their products. Variations and custom interfaces add to the complexity, and as a result, upgrades and security patches are often missed.
Mobile Ransomware
With the increasing use of mobile phones to access corporate data, mobile ransomware is a growing problem. Similar to ransomware that infects computers, mobile ransomware encrypts files on a mobile device and then demands a ransom to restore the user’s access to files. Attackers using ransomware may also steal large quantities of data before blocking access to its legitimate owners.
Jailbreaking, or Rooting
Jailbreaking, or rooting, means removing software restrictions put in place by the device manufacturer. It allows the device to install unauthorized or third-party software, including digital currency miners. Attackers who use this technique gain privileged administrator access to mobile devices. These permissions give attackers greater access than the default permission, allowing them to do more damage and steal more data. The process is made easier because many users will jailbreak their own devices. Deploying software that includes rooted and jailbroken device detection is an important way to mitigate this threat.
Trusting Users
Many users are unaware of the serious security threats to their mobile devices, and many users do not see mobile security as their concern. Even more users think that losing a mobile phone with company data on it is not a big threat. Company employees who lack awareness of mobile security are becoming a major threat to organizations, which need proper processes in place to educate their staff about the risks.
Network Spoofing
Some hackers set up fake access points that look like real Wi-Fi networks. They trick users by adopting legitimate-sounding names like ”‘Airport Wi-Fi”. These encourage people to set up accounts to access the “free” services advertised. The danger comes because many people use the same email and password for many services, giving a hacker a route to compromise users’ email, banking, and other services.
Encryption Gaps
End-to-end encryption is one of the key tools in securing information. With this method, data is encrypted all the way from one device, through the network, to the end-point device. A point on this route that breaks this chain is known as an encryption gap.
One of the major culprits is unsecured public Wi-Fi networks. Because they are not secure, they leave a hole where cyberattackers can access the information sent from an enterprise network to employees’ phones. Using VPNs is an effective approach to mitigate this threat.