Mobile phone security among company executives?

Mobile phone security among company executives?

March 5, 2020 Off By admin

"Executives need to look at the security of their mobile phones.

These have become a surprisingly easy and very profitable target for hackers. according to Palo Alto Networks Technical Director Eric Antibi.

This article will also interest you: Private companies facing vulnerabilities of connected objects

This position of this security officer can be explained by the the fact that it is common to hear in the news that a particular public figures had his terminal hacked. When they're not artists, they are CEOs of well-known companies like Amazon. A wink to the hacking of Jeff Bezos' phone. Hackers are starting to love more plus that kind of victim. Not only is this generally very but the amount of information that is compromised is truly enormous. he often when experts don't even detect a trace of hacking computer science. A serious problem so you have to take by the horns.

And what really explains this? at beginning with the explosion of communication technologies, companies had tend to offer their executives terminals with only professional tools. But today with the smartphone that is used for both work and personnel device times, the hacker will first of all, to look at certain personal data such as private photos, exchanges of messages, and then turn to activities other than installing malware that allows spy on the user. By this kind of action a given leak is quickly and secrets revealed or even stolen for unhealthy purposes. the companies are becoming more and more vulnerable as a result. We too often uses dual-use devices and which is more dangerous than advantageous, especially if some of the cybersecurity measures are not being followed. "When we use our laptop for work tasks, we expand the cyberthreat attack surface. It is important to take this into account, because many companies not only do not fully understand the threats which hover over these aircraft, but also lack experienced personnel to remedy this with tools other than basic managers. ».

So what are the different challenges associated with the use of our private smartphones and vice versa?

The very first will be at the application level. in Indeed, applications are constantly increasing by the day and offer more and more services that we may be interested in. While some giants such as that Google and Apple are doing their best to make their applications, this is not always the case for other software provided by third-party programmers. "The security of third-party applications remains Worrying. We've added a lot of features to our phones, and many of them have enabled cybercriminals to access easier to reach our business contacts and their phone numbers. Criminals infiltrate our phones through apps fraudulent scams who suddenly see themselves having a second life or through vulnerabilities in common applications such as WhatsApp. It is not then not difficult for them to install professional malware for the jailbreak, espionage, ransomware or data exfiltration. Noted Eric Antibi.

Secondly, the explosion of hacking methods outside Applications. Indeed, today it is possible with a telephone number to have access to a certain amount of personal information and data. This information can then be used to initiate certain actions that may be harm the professional life of any person involved. One of the things we are talking about is the SIM Swapping, or Simjacking.

However, this security problem is not a calamity in itself. To remedy all its drawbacks, the head of a finger business as Eric Antibi means, adopt good practices. "As a leader, you should personally apply these best practices and ensure that effective mobile security procedures are deployed and implemented for all employees. You are in a unique position of strength to send the right message to your colleagues and employees. Your phone is just as much a computer as any desktop, laptop or server. Protect him just as much. ».

Now access an unlimited number of passwords:

Check out our hacking software