Top 5 Mobile Device Cyber Attacks You Should Look out for

There’s no doubt that mobile devices are now being used to perform work activities, just as much as traditional computers.

However, people are forgetting to keep their mobiles secure and protected from threats.

Here are the top 5 mobile device cyber attacks you should look out for and how to avoid them.

 

1. Mobile Malware Hidden in Apps

Sometimes, it can be near enough impossible to tell whether an app is legitimate or has hidden malware inside.

Scammers will create a convincing looking application, with good looking graphics and even a high star rating. Once the app has been opened for the first time, the hidden malware will infect the device.

The best way to make sure you don’t get caught out by this trick is to download apps only from the official app store on your device. If you’re about to download an application that isn’t fully verified or by a highly rated publisher, make sure your mobile device has some kind of security software such as Bitdefender Mobile Security or AVG Anti-Virus.

2. Unprotected Communications

Have you ever sent someone a password or credit card details over a text message or messaging app? Did you check to see if the communication was encrypted?

When using your mobile device for messaging, make sure the application and messages are encrypted. This makes sure that you and the recipients are the only people who can see the messages.

The best apps that for encrypted communication are WhatsApp and Facebook Messenger.

3. Public Wi-Fi Connections

Although public Wi-Fi is known to be unsecure, people still choose to connect to it when available.

Hackers can set up fake networks that look legit. It might seem like you are connecting to a coffee shop’s free Wi-Fi when you’re actually connecting to a fake network and giving the hacker access to everything you do.

To avoid this, we recommend using your mobile data, whenever you’re signing into something or purchasing something whilst out and about.

 

4. Non-Updated Devices

Approximately, 40% of Android devices are running outdated versions that no longer receive important security updates. 

A mobile device that isn’t kept up to date is more vulnerable to hackers who try to exploit and take advantage of code vulnerabilities within the OS or apps.

Make sure all your applications and especially your mobile’s operating system are up to date, as they may include vital security patches.

5. Public USB Charging Stations

Juice jacking is a cyber attack on mobile devices that many people don’t know about.

Public USB charging stations have become an easy place for hackers to you as they’re inviting sights, especially when your phone battery is low. Hackers will infect public USB ports with malware and set up fake charging stations. Once your phone has been plugged in, the malware will copy all your data and/or infect it.

It’s best to avoid all public USB charging ports and charge using your own power adapter. You can also purchase “charge only” USB cables if a cord is your only charging option.

Looking For More Ways to Stay Secure?

We’ve recently launched our monthly newsletter filled with tips, tricks and vital cyber security news/help. If you want to learn more ways to avoid cyber attacks and scams, sign up using the button below.

Interested in what else our IT Support package includes?

There are many reasons that IT support with Reformed IT is a great choice for your business or organisation. If you choose Reformed IT for your IT support, you'll receive all these benefits including help from members of our experienced team when needed.

Unlimited IT Support

We provide fully inclusive, onsite and remote IT support. In addition to that, it won't cost you extra for an engineer to attend your site to resolve a technical issue.

Device Status Monitoring

When we take on your IT support, we deploy our monitoring agent onto all devices and servers. This alerts us to any issues which you may be unaware of.

Data Breach Monitoring

There are over 8 billion breached passwords and personal information available on the dark web. There's a possibility that some of this data relates to your employees. We'll monitor dark web activity and provide reports of breached passwords.

Cyber Essentials Certification

We ensure every one of our clients achieve their Cyber Essentials certification at no additional cost. We also help them towards Cyber Essentials Plus ensuring that everything is ready for assessment.

Office 365 Monitoring

We monitor your Microsoft 365 tenancy with our 24/7 security operations centre. If there is strange activity we'll find it immediately  and alert you or resolve the issue straight away. Keeping your business secure.

Anti-Virus Software

Everyone wants to avoid computer viruses. We include anti-virus software as part of our IT support package to keep your devices safe and to save time when it comes to viruses.

Email Security

Over 90% of cyber attacks start with a phishing email. It's crucial that your business has the best defence against cyber criminals and scams when regarding your mailbox.

Backups for Office 365

We will ensure that all of your emails and files are backed up, at no extra cost. We recognise the importance of backups and disaster recovery so we feel it shouldn't be an added extra.

Managed Email Signatures

With our included Exclaimer signatures for Office 365 service, you can get more out of your email signatures instead of a simple message with no images.

Cyber Security Training

To keep you even safer from hackers, we provide globally recognised and market leading Cyber security training by PhishingTackle. This online training portal will provide your teams with guidance and information to reduce the risk of hackers and scams.

Asset and Warranty Tracking & Reporting

We provide you with a list of your current assets in the business by using our powerful remote management tools. This creates a monthly asset report so you can keep track of your hardware life cycles.

Reformed IT Academy

We'll provide your business with the best IT training and learning sources. With the Reformed IT Academy, you’ll be able to watch and complete over 700 courses to help grow your knowledge and skills.

Password Manager

Password managers make storing and creating passwords much easier and safer. Keeper password manager also auto-fills passwords making the sign in proccess much quicker.

Cyber Threat Monitoring

With Huntress, you'll have an extra layer of security to help keep hackers out of your business. You'll be able to Monitor cyber attacks and malicious activity.

5.0 97 reviews

  • Avatar Nathan W. ★★★★★ a month ago
    Reformed IT have been beyond brilliant with helping us improve our current IT infrastructure and security. The services that they provide has taken enormous pressure off our internal … More IT team. They are always keen on sharing their knowledge and skills and always go above and beyond. I can’t recommend them highly enough.
  • Avatar Emily S. ★★★★★ 7 months ago
    Reformed IT are beyond brilliant, anytime I have called in need of help since working for Walton & Allen, nothing is too much trouble, they have resolved any issue with ease.
    The
    … More staff are always happy to help, friendly service every time. It can be stressful when your job is based mostly on a computer, and there is some kind of problem you are unsure how to resolve, but with Reformed IT just a phone call away, it is so re-assuring to know that anytime I hit a roadblock, you guys are there to save the day!
    Big thanks to you all, be lost without you guys!
  • Avatar Richard W. ★★★★★ 8 months ago
    We've only been using Reformed IT since the start of this year but we've had a great service from them. The service desk quickly resolve any issues & Joe & Scott have … More been very proactive in increasing our IT security & offering advice on how best to configure our systems & equipment. Can't recommend them highly enough!
  • Avatar Boneham T. ★★★★★ 8 months ago
    Reformed IT are a refreshing and innovative managed IT provider. They have been hands down the most proactive and responsive IT support company we have worked with. If you take your … More IT, cyber security and networked systems seriously, ensuring continuity, resilience and a high level of response and support, then we can honestly recommend the Reformed IT approach.