Mobile devices are under attack.
Mobile devices are under attack.
Cybercriminals are deliberately targeting phones, tablets, and Chromebooks to increase their odds of finding a vulnerable entry point. The Financial Services Threat Report from Lookout disclosed that 20 percent of mobile banking customers had a trojanized app on their devices when trying to sign int...

Financial services and insurance organizations had more exposure to mobile phish in 2020. The odds of finding a vulnerable entry point are increased by cyber attackers targeting phones, tablets, and Chromebooks.

Despite a 50 percent increase in adoption of mobile device management, average quarterly exposure to phish rose by 125 percent. App risk exposure increased by over 400 percent.

Twenty-one percent of Apple's devices were still on iOS 13 or earlier seven months after the release of the new operating system. The window of opportunity for a threat actor to gain access to an organization's infrastructure and steal data is created by the delay of users updating their mobile devices.

Businesses and their customers have been exposed to new risks due to the digital environment. The financial services industry is in the middle of a digital transformation.

The finance industry experienced a 71 percent increase in the adoption of mobile apps in 2019. Financial institutions are using tablets, Chromebooks, and smartphones more and more.

Security and IT teams had to make sudden changes to their strategies and policies because of the overnight change. To keep some semblance of control over mobile access to the corporate infrastructure, security teams expanded the capacity of their corporate VPNs and rolled out MDM to more mobile users.

Schless noted that a significant jump in mobile threat exposures still occurred despite mobile device management.

Attackers were smart very quickly. They were able to easily evade the basic management policies put forth by MDM solutions. He said that the increase in mobile threat exposures was due to this.

He said that the only way to protect against these attacks is to implement an integrated endpoint-to-cloud security solution. The solution can verify the risk posture of the device and the user to make sure no unauthorized users gain access to the infrastructure.

Business needs to act on security.

Phishing emails can contain personal information. Joseph Carson, chief security scientist and Advisory CISO at ThycoticCentrify, said they often appear to be a legitimate service from a known vendor.

Phishing emails often pose as an urgent message from an authority that requires quick action such as clicking a link or opening a file to avoid further trouble, late fees, and so on. He told TechNewsWorld that some of the emails are legitimate to disguise the one malicious link among them.

Spear-phishing emails target you personally, by pretending to be from someone you know and trust, such as a friend, colleague or boss. The emails have a hyperlink or attachment in them.

Unless you know the person well, do not accept friend requests.

You would mark the senders of the suspected scam emails as junk or junk mail. If they appear in your work inbox, report them to your IT security department.

Never forwarding a fraudulent email is a safety tactic. Make sure you have taken the necessary precautions to protect your devices and systems.

Mobile data and internet usage can indicate that a device has been compromised and that data is being stolen. He said to always review your monthly internet usage trends, typically available from your internet service provider, for both downloads and uploads.

What's your reaction?


0 comment

Write the first comment for this!

Facebook Conversations

Disqus Conversations