• Roark Tech Services

If You Connect It, Protect It: Mobile Devices

The bad actors out there understand the need to constantly innovate and design new methods of separating you from your money. They prefer not to hack – why hack someone when you can simply trick them into giving away their credentials? -- but, either way, there is an evolving and relentless campaign targeting individuals, businesses (small and large) and every level of government. And they’re succeeding! The Center for Strategic and International Studies estimates a loss of over $6 trillion, globally, to cyber crimes in 2020. With cybercrime targeting every connected device, we must change our thinking and understand that it’s just not computers and networks that require protection. Your mobile phone is a connected device – full of valuable information, access to sensitive accounts and personal details, that criminals can use to exploit your lack of protection. In addition to the more popular attacks that use Ransomware and Phishing cybercriminals are now using malicious Apps or “riskware” to gain the access they desire. These apps ask for permissions and data access under the guise of improving the app experience, but what they're doing is mining data to sell. At best, this scam results in increasingly invasive advertisements. At worst, sensitive data is used to steal your identity. Here are our recommendations to protect your mobile devices.


UPDATE YOUR PHONE

When an OS update is released it’s a good idea to pay attention. The same goes for the apps on your phone. While these updates are always intended to improve performance and fix minor bugs, there is a particularly good change a security vulnerability is getting sealed. Update your software on your device when prompted. If you are unsure about the update, we can provide advice based on our testing. The point is mobile OS and app updates are an important part of security.

ONLY DOWNLOAD APPS FROM TRUSTED SOURCES

It is quite easy – and common – to hide malicious code inside an app. Those who wish to steal your identity or money will attempt to trick you into downloading a counterfeit app or simply one that promises to easily solve a problem. Either way, the hidden code could compromise your phone, your information and your security and you may never know it. Apps sold th

rough the Apple Store and/or Google Play meet strict development criteria and are vetted for malware. They are the safest way to purchase virus-free software. Avoid third-party app stores that may or may not apply the same level of scrutiny.

USE STRONG PASSWORDS Use strong passwords and use different passwords for different mobile apps and sites. To add a second layer of protection, enable two-factor authentication for each account and invest in a Password Manager to help keep track of all your complex passwords. Dashlane, LastPass and 1Password are among the most popular tools to manage passwords and keep you safe. Remember, hackers do not “hack” in, they “log in”.


WI-FI & BLUETOOTH BEST PRACTICES It’s never a promising idea to connect to an unsecured network via Wi-Fi or Bluetooth connection, this includes coffee-shops, airports rented cars and restaurants. When you connect to an unsecured Wi-Fi network your traffic is wide open to interception. To combat this, use VPN software to encrypt your Wi-Fi traffic and keep your data secure. There are many VPN tools available, but the best tools are those you pay for. When you connect your mobile phone to a rental car, you expose your contacts and other information to a public vehicle. The next person that rents the car may have access to your contact list, including email addresses. Avoid connecting your mobile phone to a random USB port, even for charging. Public charging station, such as those in airports and longed, are known for attacks. Use a “USB Data Blocker” or USB power-only cord to avoid the risk of “plugging into” a dangerous source. While inconvenient, it is a good practice to turn off Bluetooth when you are not using it. With Bluetooth turned on, an Apple iPhone can recognize when another Bluetooth-enabled iPhone is nearby, opening the possibility of someone sending malware to your phone.

APPLE PAY & ANDROID PAY

Credit card breaches are rampant. Apple Pay and Android Pay can minimize who has access to your card. These payment methods do not pass your credit card number to the merchant (or to Apple & Google). These payment methods are significantly faster than inserting a card.

Our team is constantly testing to identify the latest security challenges, changes and best practices to keep you safe and informed. We are always ready to assist you. Contact us.

5 views0 comments

CONTACT US

Have a Question or Need Quick Help?

Send us a message or use the chat function and a technician will jump right on it. Our technicians are available 24x7, after hours and on the weekends to respond to emergencies.

Use this form to sign up for our weekly newsletter.

HEADQUARTERS

515 Madison Avenue, 8th Floor

New York, NY 10022

REGIONAL OFFICE

3801 PGA Boulevard, Suite 600

Palm Beach Gardens, FL 33410

info@roarktechservices.com​

(212) 682-3555

linkedin-white.png
twitter-white.png
instagram-white.png
facebook-white.png

@copyright Roark Tech Services 2021