The Battle Between BYOD and Corporate Policies
The Battle Between BYOD and Corporate Policies Over the past few years mobile devices have really become integrated into our work lives and some statistics we have recently received about the use of mobile devices in Westchester NY have revealed an increasing number of phishing attacks on mobile devices users which means for the Enterprise environment a constant struggle in keeping up with cybersecurity. Recently our team has conducted a phishing attack tha was different than it would have been five or six years ago because we were targeting a bank and five or six years ago bank employees really didn’t know lot about security for mobile devices. Today, on the other hand those security tools are really integrated into the workforce. If the goal of a hacker is to break into a Microsoft 365 account because of course in the Microsoft 365 platform you have all kinds of sensitive material there such as SharePoint and OneDrive in their emails and even if your your, the first step towards a safe cyber environment is to safegurard the emails. It’s pretty common to accidentally tap a link with around 40 percent of emails globally being spam and the average American receiving 14 unsolicited SMS texts per month. Here’s what usually happens when you open a phishing link. After clicking a phishing link the sender knows you are a valid target. The attacker receives some basic data like approximate location device statistics and information voluntarily provided. A phishing link may download malware and users should take precautionary measures. It’s critical to stop interacting with the page and delete any downloaded files. Search for the intended target site using a search engine and the computer. Compare the legitimate web address and content to the phishing site; watch for suspicious account activity calls or texts follow on signs of phishing include suspicious emails social media posts with shortened links copycat URLs. If the attackers succeed in collecting data phishing scam victims might receive manipulative calls or text messages urging them to take further actionsonce a target has responded to a first phishing attempt there is a higher likelihood that they will continue to fall prey to future prompts A smartphone can be hacked by clicking a link found in email text messages or software.Tapping or opening a phishing link can expose users to automatically downloaded malware. Sometimes the malicious link may redirect a user to a malicious website or application controlled by hackersdesigned to collect user information or infect a mobile phone. A cyber criminal doesn’t need to get a hold of your smartphone to infect it with malware. if your phone is connected to the internet hackers can infiltrate your device through phishing links. Sometimes the messages can seemingly come from legitimate companies or reputable organizations as a notice about their services or apps.Clicking or tapping on these phishing links can open a pathway into your smartphone. An attack surface on smartphones is typically smaller and conducted with purpose-built apps that can compromise your mobile phone causing apps to malfunction and slow your device. Do not install unnecessary apps that can drain your phone battery and consume your data plan faster. Apps should only be downloaded not from the Internet but from the Apple Store and the Google Play store.
The Battle Between BYOD and Corporate Policies Read More »