Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphone Malware Is a Serious Threat

Smartphone Malware Is a Serious Threat

We all know how important it is to protect your desktop and laptop computers from malicious threats. Installing antivirus and security software is one of the first steps you take when you get a new computer, and for good reason. An unprotected device is at great risk. With that said, a lot of users don’t think about the threats that target their most-used devices, their smartphones.

Malware and other cybersecurity threats are not a new thing to smartphones and mobile devices, but they don’t tend to get the same attention as threats that target Windows. This might be because, for the most part, mobile device malware is a little less common, or at least a little less intrusive. That doesn’t make it any less of a problem though.

You might also feel a little less at risk simply because of your relationship with your device. Our smartphone is often with us day and night, at work and at home. Combine that with the fact that most users use their smartphones in a sort of echochamber, they might not be directly exposed to threats as often as they are on a PC. We’ll get to more on this shortly, but first it’s important to break down the risks based on whether you have an iOS or Android device.

iPhone Malware

Apple may tout iOS as being the safest mobile operating system on the market, but it has never been completely safe. The biggest risks are only a problem for users who have jailbroken iPhones, meaning they ‘hacked’ their own device to allow themselves to bypass Apple’s built-in security restrictions. If you haven’t done that, you are avoiding a lot of risk. The other risk, which is less common, involves a more major type of risk called a zero-day hack. Zero-day hacks target devices that haven’t received a security update after the security update has been released to the public. 

The problem with iOS security is that there aren’t a lot of ways to prevent the issue, and you are really at the mercy of Apple to keep your device safe. They certainly want to keep their reputation, so trusting in them to do so isn’t invalidated.

Android Malware

Android is in a different situation. There are a lot more risks for Android devices, simply because there are many different manufacturers making and supporting the operating system. For example, Samsung uses a slightly customized version of Android, and if you have a Galaxy Note 10, you’ll get the latest updates to Android on a different schedule than Google’s Pixel. 

Android is also more open and flexible than iOS, which is why a lot of users prefer Android over iOS. If you want to install an application that hasn’t been vetted by Google, you can. You can also jailbreak an Android device, which, similar to jailbreaking an iPhone, can override some of the built-in security restrictions.

Even installing apps off of the Google Play Store can sometimes lead to malware being installed. Google has had to play cat-and-mouse with app developers to keep threats off the marketplace, but it has become clear that it really comes down to the user being careful with what they install.

That isn’t to say you should abandon Android or restrict your employees from using Android devices to access company email or other apps. Many long-time Android users never experience malware - it depends on how you use your device.

How to Protect Your Smartphone from Malware

Rely on that Echochamber - We mentioned this earlier, but both Android and iOS feature their own app stores. Although Android devices can install applications that aren’t on the Google Play store, most modern devices make it a little harder to do so, or at least add an extra step warning users that it might put their device at risk.

If you don’t jailbreak your phone, and you only install applications that are thoroughly vetted, positively reviewed, and come directly from the Apple App Store or Google Play, you will greatly reduce the risk of infecting your device.

Don’t Get Phished - Many threats these days don’t even rely on infecting a certain device to get things going. Instead, they rely on the end user to slip up and make a mistake. Phishing attacks are a prime example of this. A user will get a legitimate-looking email from a bank, online store, or other common online account and be asked to submit their login credentials. This email is actually spoofed and made to look real, and upon logging in, the password will be sent to a cybercriminal instead.

Install Anti-malware - Most antivirus and anti-malware software providers have Android apps. It’s not a bad idea to have something running on your phone to help protect you.

Establish Device Security Policies - If you are a business owner and your employees use their personal devices to check email, review documents, and communicate for work, it’s a good idea to establish a mobile device policy. You can require users to enable device locking, encryption, and other security features. This gets set up on your network, and when they sign in to their email on their device, their device has to comply with your company’s requirements before they can get access to anything.

We can help you protect your company data, including helping you establish centralized mobile device security policies. If you want to learn more, don’t hesitate to give us a call at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Saturday, 15 August 2020
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Business Computing Cloud Best Practices Hackers Privacy Malware Business Email Productivity Hosted Solutions Network Security Microsoft Software Productivity Internet IT Services Computer Windows 10 Managed Service Provider Backup Data Backup Innovation Ransomware Mobile Devices Business Continuity Outsourced IT Hardware Smartphone Android Upgrade Efficiency Data Google Social Media User Tips Data Recovery Managed IT services Disaster Recovery IT Support Browser Communication IT Support Workplace Tips Small Business Business Management Managed IT Services Smartphones Data Management Cloud Computing App Cybersecurity Phishing Office Remote Monitoring Server Miscellaneous Holiday Microsoft Office Internet of Things Network Facebook Paperless Office Password communications VoIP Office 365 Windows WiFi Save Money Encryption Tech Term Collaboration Artificial Intelligence Spam Passwords Gmail Big Data Apps Hosted Solution Recovery Wi-Fi Compliance Saving Money Employer-Employee Relationship Vendor Management Risk Management Customer Relationship Management Unified Threat Management Bandwidth Firewall Windows 10 Document Management Robot Content Filtering Money Mobile Device Management Customer Service Work/Life Balance Downtime Operating System Healthcare Office Tips Windows 7 Remote Computing Managed Service Analytics Managed IT Infrastructure Chrome Word Hacker Apple How To Tip of the week Avoiding Downtime Government Hacking Mobile Computing SaaS BYOD Vulnerability Tech Support Help Desk Social Data Security Website IT Management File Sharing Business Growth Presentation Two-factor Authentication Mobile Device Settings Antivirus Automation Redundancy Going Green The Internet of Things Alert Applications Outlook Data loss Computers Project Management Printing BDR Software as a Service Data storage Business Technology Computing Meetings Storage Telephone Systems Education Health Virtual Reality Training Cybercrime Scam Identity Theft Electronic Health Records Access Control IT solutions Safety Competition IoT Automobile Upgrades Wireless Technology Budget Wireless End of Support VPN Assessment Information Technology Mouse Server Management Licensing Humor Virtual Private Network Consultation Digital Payment YouTube Legal Maintenance Analyitcs Unified Communications Display Twitter LiFi Regulations Politics Monitors Travel Google Drive Specifications Websites Physical Security Time Management Tablet Net Neutrality Taxes Mobility Proactive Augmented Reality Botnet Smart Technology User HIPAA IBM Samsung Running Cable Remote Monitoring and Management Router Retail Mobile Security Laptops Bring Your Own Device Best Practice Search Lithium-ion battery Sports Business Owner Computer Care IT service Cortana Virtualization Marketing Administration Patch Management Solid State Drive How To Typing Nanotechnology PowerPoint Error Dark Web Professional Services Internet Protocol Heating/Cooling Vulnerabilities Buisness Computing Infrastructure Remote Workers Hard Disk Drive Consumers Chatbots User Management Cyber Monday Networking Firefox Cryptocurrency Supercomputer Knowledge Data Warehousing Cyberattacks Alerts Virtual Assistant Update SharePoint VoIP streamlines Servers Geography Web Server Information Identity Batteries flu season eWaste Bitcoin Utility Computing IT Budget Experience Administrator Microsoft Excel Bookmarks 3D Printing Cameras Cooperation IT Sevices Voice over Internet Protocol Chromebook Downloads business network infrastructure Cables Monitoring Remote Work Law Enforcement Fort Worth Network Congestion Unsupported Software Techology Environment Windows 8 Blockchain Favorites CCTV Staff Domains Emoji Multi-Factor Security Statistics Wires Software Tips Consulting File Management 5G Gadget flu shot Entrepreneur Mail Merge Application Mobile Data Disaster Resistance Hacks Troubleshooting Cost Management Permissions Conferencing Users Flexibility Manufacturing Public Speaking Google Calendar Bluetooth Corporate Profile Telephone Fort Worth IT Address Proactive IT Current Events Quick Tips Hard Drive Phone System Fraud Employees G Suite Operations Gadgets Processors Legislation MSP History WannaCry Social Networking Mobile VoIP DFW IT Service Hard Drives IT Consulting Recycling Laptop Motion Sickness Zero-Day Threat Virtual Desktop Wearable Technology Proactive Maintenance Google Docs Cabling Motherboard Staffing Windows Server 2008 Writing Backup and Disaster Recovery Refrigeration Personal Information Data Breach Network Management Management Halloween Internet Exlporer IT Consultant Processor VoIP Deep Learning GPS Co-Managed IT Fun Machine Learning Distributed Denial of Service Social Engineering RMM Computer Repair data services Technology Laws Touchscreen iPhone Enterprise Resource Planning Google Maps Scary Stories Cleaning IT Technicians Notifications Technology Tips WPA3 Disaster Digital Modem Tracking Business Telephone Relocation Managed IT Service Lenovo Procurement Undo Electronic Medical Records User Error Unified Threat Management Google Wallet Mobile Webcam Hotspot Mirgation Active Directory IP Address Crowdsourcing Comparison Dark Data Shortcut Fleet Tracking Uninterrupted Power Supply Spyware Alt Codes Cookies Biometric Private Cloud Break Fix Superfish Remote Worker Printer business communications systems Drones Company Culture Point of Sale Language Migration Windows Server Mobile Office Black Friday Asset Tracking

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code