How to Protect Your Mobile Devices – Part 2

How to Protect Your Mobile Devices – Part 2

Protection for mobile devices has become an increasing concern for both individuals and organizations that practice BYOD (Bring Your Own Device). So, we’ve compiled a list of areas that can help users stay ahead of any potential cyber threats.

In part 1, we discussed some of the most effective and well-known recommendations to keep your laptop or smartphone safe from cyber criminals. In part 2, we’ll talk a bit about authentication and recognizing a potential security threat.

Authentication

Authentication for both users and devices has become critical for modern security practices. Individuals and organizations are looking to leverage advanced technology to establish authentication. Organizations are bringing multi-factor authentication to their employees to ensure that data is only being accessed by authorized users. Identity security isn’t a new concept, but there is a renewed interest in it. There are currently many companies offering Identity-as-a-Service (IDaaS) to users.

Your personal phone or laptop can also take advantage of multi-factor authentication. Microsoft, for example, offers a two-step verification method so you can receive a verification code that is sent as a text message. This prevents strangers from logging into your accounts from unfamiliar devices. Google has a similar two-step verification, so it’s certainly worth setting up these built-in multi-factor authentications for your devices.

Passcodes and Passwords

A strong passcode or password for your device can be a nearly impenetrable line of defense against outsiders trying to access your data. A recent study found that many users, unsurprisingly, are using less than optimal passcodes for their smartphones. Users are choosing obvious passcodes like “0000” or “1234” out of convenience. Passwords in 2021 have also been just as predictable, with some of the more common passwords being “123456” or “password.” It doesn’t take a security expert to see how ineffective these passwords can be. The point of a password is meaningless if hackers can quickly guess it.

Although it might not be as convenient, coming up with a unique or complex password is a great way to secure your mobile device from being accessed by hackers. You should also avoid reusing passwords between accounts. It may be more challenging to keep track of multiple passwords, but it will provide greater overall security if one of your accounts is compromised. Several apps provide a secure ledger of all of your passwords. Even if you rely more on Touch ID or Face ID, it’s important to pair this with a strong passcode/password.

Recognize Social Engineers

Social engineering is exploiting one of the more vulnerable parts of a business: the people. Anyone can be a target and the methods of social engineering are becoming more advanced. Whether it’s receiving an email requesting your password for verification, or a malicious file to click on, the threats to bypass your security are constant. According to Microsoft, Phishing (a specific type of social engineering) accounts for 70% of all new attacks. This not only shows how serious the problem is, but also how successful social engineering can be. A recent Barracuda study found that most organizations will receive around 700 social engineering attacks per year, with successful attacks costing these organizations millions.

Anyone can fall victim to these attacks, so users must recognize the signs before responding or engaging. Luckily there are many ways to tell a legitimate message from a malicious one. Suspicious email addresses, incorrect spelling, random attachments and spoofed hyperlinks are all indicators of a phishing attempt.

Beware of Malware

Like social engineering attacks, malware can be found and downloaded onto your computer from inconspicuous places. Malware or malicious software is the umbrella term for all types of software designed to “damage and destroy computers and computer systems.” Within malware, we find the specialized viruses that prey on users such as spyware, ransomware, Trojan viruses and more. To avoid accidentally downloading these kinds of viruses you need to be vigilant and recognize when a link or download is harmful. Being overly cautious of suspicious links or files is never a bad idea.

If malware is downloaded onto your device, don’t panic, there are ways to identify and remove it. Depending on the device, you are usually able to run a security scan to quarantine and delete the malicious files. If you’re locked out due to ransomware, you’ll likely need to contact the manufacturer of the device for recommendations. This can be a huge headache but when a device is compromised, you’ll need to stop using it for sensitive information such as banking or shopping. For the most part, if your security software is up to date, you’ll be able to deal with a malicious virus.

Hopefully, this blog series illuminated some of the ways to protect yourself and your devices from cyber threats. And although the threat of attack is increasing, there are many protocols and tools to help keep your devices safe. If you’re interested in learning more about Red River’s security capabilities as well as some of our specific offerings, please check out our security webpage.