Nottingham: 01158 244 824

Remote IT Support? Click Here!

Derby: 01332 890 370

Top 5 Mobile Device Cyber Attacks You Should Look out for

There’s no doubt that mobile devices are now being used to perform work activities, just as much as traditional computers.

However, people are forgetting to keep their mobiles secure and protected from threats.

Here are the top 5 mobile device cyber attacks you should look out for and how to avoid them.

 

1. Mobile Malware Hidden in Apps

Sometimes, it can be near enough impossible to tell whether an app is legitimate or has hidden malware inside.

Scammers will create a convincing looking application, with good looking graphics and even a high star rating. Once the app has been opened for the first time, the hidden malware will infect the device.

The best way to make sure you don’t get caught out by this trick is to download apps only from the official app store on your device. If you’re about to download an application that isn’t fully verified or by a highly rated publisher, make sure your mobile device has some kind of security software such as Bitdefender Mobile Security or AVG Anti-Virus.

2. Unprotected Communications

Have you ever sent someone a password or credit card details over a text message or messaging app? Did you check to see if the communication was encrypted?

When using your mobile device for messaging, make sure the application and messages are encrypted. This makes sure that you and the recipients are the only people who can see the messages.

The best apps that for encrypted communication are WhatsApp and Facebook Messenger.

3. Public Wi-Fi Connections

Although public Wi-Fi is known to be unsecure, people still choose to connect to it when available.

Hackers can set up fake networks that look legit. It might seem like you are connecting to a coffee shop’s free Wi-Fi when you’re actually connecting to a fake network and giving the hacker access to everything you do.

To avoid this, we recommend using your mobile data, whenever you’re signing into something or purchasing something whilst out and about.

 

4. Non-Updated Devices

Approximately, 40% of Android devices are running outdated versions that no longer receive important security updates. 

A mobile device that isn’t kept up to date is more vulnerable to hackers who try to exploit and take advantage of code vulnerabilities within the OS or apps.

Make sure all your applications and especially your mobile’s operating system are up to date, as they may include vital security patches.

5. Public USB Charging Stations

Juice jacking is a cyber attack on mobile devices that many people don’t know about.

Public USB charging stations have become an easy place for hackers to you as they’re inviting sights, especially when your phone battery is low. Hackers will infect public USB ports with malware and set up fake charging stations. Once your phone has been plugged in, the malware will copy all your data and/or infect it.

It’s best to avoid all public USB charging ports and charge using your own power adapter. You can also purchase “charge only” USB cables if a cord is your only charging option.

Looking For More Ways to Stay Secure?

We’ve recently launched our monthly newsletter filled with tips, tricks and vital cyber security news/help. If you want to learn more ways to avoid cyber attacks and scams, sign up using the button below.

Interested in what else our IT Support package includes?

There are many reasons that IT support with Reformed IT is a great choice for your business or organisation. If you choose Reformed IT for your IT support, you'll receive all these benefits including help from members of our experienced team when needed.

Unlimited IT Support

We provide fully inclusive, onsite and remote IT support. In addition to that, it won't cost you extra for an engineer to attend your site to resolve a technical issue.

Device Status Monitoring

When we take on your IT support, we deploy our monitoring agent onto all devices and servers. This alerts us to any issues which you may be unaware of.

Data Breach Monitoring

There are over 8 billion breached passwords and personal information available on the dark web. There's a possibility that some of this data relates to your employees. We'll monitor dark web activity and provide reports of breached passwords.

Cyber Essentials Certification

We ensure every one of our clients achieve their Cyber Essentials certification at no additional cost. We also help them towards Cyber Essentials Plus ensuring that everything is ready for assessment.

Office 365 Monitoring

We monitor your Microsoft 365 tenancy with our 24/7 security operations centre. If there is strange activity we'll find it immediately  and alert you or resolve the issue straight away. Keeping your business secure.

Anti-Virus Software

Everyone wants to avoid computer viruses. We include anti-virus software as part of our IT support package to keep your devices safe and to save time when it comes to viruses.

Email Security

Over 90% of cyber attacks start with a phishing email. It's crucial that your business has the best defence against cyber criminals and scams when regarding your mailbox.

Backups for Office 365

We will ensure that all of your emails and files are backed up, at no extra cost. We recognise the importance of backups and disaster recovery so we feel it shouldn't be an added extra.

Managed Email Signatures

With our included Exclaimer signatures for Office 365 service, you can get more out of your email signatures instead of a simple message with no images.

Cyber Security Training

To keep you even safer from hackers, we provide globally recognised and market leading Cyber security training by KnowBe4. This online training portal will provide your teams with guidance and information to reduce the risk of hackers and scams.

Asset and Warranty Tracking & Reporting

We provide you with a list of your current assets in the business by using our powerful remote management tools. This creates a monthly asset report so you can keep track of your hardware life cycles.

Reformed IT Academy

We'll provide your business with the best IT training and learning sources. With the Reformed IT Academy, you’ll be able to watch and complete over 700 courses to help grow your knowledge and skills.

Password Manager

Password managers make storing and creating passwords much easier and safer. Keeper password manager also auto-fills passwords making the sign in proccess much quicker.

Our Team

We have over 30 years of combined IT support experience. We like to use analogies and stories to explain technical terms instead of baffling you with science.

5.0 56 reviews

  • Avatar Tom M. ★★★★★ 2 months ago
    A recent utility emergency at one of our sites was made much more bearable due to Reformed going above and beyond. Would recommend for all IT and communication requirements.
  • Avatar Laura H. ★★★★★ 4 months ago
    Always helpful when I have any issues in office. Today, my laptop died whilst working from home and after not being able to help remotely, Joe came over and was able to fix the problem! … More Super fast solution. Was here within half an hour, another half an hour later - Laptop working again.
  • Avatar Louis D. ★★★★★ 7 months ago
    Scott helped me regain most of my lost emails after moving over to a different email provider. Mentioned he was just happy to help out a small local business. he was really professional … More and spent a good deal of time helping me with my problem! cannot recommend them enough and saved my skin!
  • Avatar Caroline S. ★★★★★ 7 months ago
    We have recently had Reformed IT install a new 3CX phone and IT systems. Their team are extremely friendly and helpful. Nothing has been too much trouble for them. I would highly … More recommend their services.