sidearea-img-1
SEGMENTECH INC is an IT Security Services consultancy focusing on the design, implementation and operations of secure IT solutions and systems. Located in Canada, we are a motivated team of IT professionals that engage with clients to plan, innovate, implement and maintain lean, simplified and secure IT operations and systems.

Recent News

Follow Us

Cyber Security Concerns and Smartphones

Home / news  / Cyber Security Concerns and Smartphones

October is a very exciting month with the new iPhone 12, first 5G smartphone, being launched on October 23rd, 2020. This month is also National Cyber Security Awareness month. More people own smartphones than PCs in today’s market, which makes the mobile platform more desirable to hackers. Many people use their smartphones as they would a PC. We keep tabs on our email, bank accounts, online shopping, social media accounts and more. The more tasks we do on our phones means that more personal data is being stored on them. Our smartphones are the most connected devices we carry, and they’re extremely vulnerable to many different kinds of attacks.

There are many ways that malware can sneak onto our smartphones. The first line of defence in protecting your data on your phone is being educated about these types of attacks.

Mobile malware is the most common of attack methods and is usually served up via a fake app. Malware apps can do damage to your phone and data in many ways. Mobile malware can install spyware, steal or delete data, hijack your text messages and other apps, and can even lock your phone and hold it for ransom.

Phishing scams are most commonly delivered via email or text messages. The main intent of phishing scams is to try to get to obtain personal information. Be aware of suspicious emails from banking and financial institutions that have a call to action such as clicking on a link to enter in account credentials. Always be cautious about clicking on links from unknown senders or suspicious looking messages from familiar institutions that don’t look quite right.

Despite the rise of mobile threats, there are many ways to protect our mobile devices.

Smartphone Security Tips

  • Use a password on your phone to prevent unauthorized access.
  • Turn off Wi-Fi and Bluetooth when not in use. These platforms are essentially open connections to your phone; so if you don’t need to use them, turn them off.
  • Turn off auto-connect to Wi-Fi networks. There are a lot of unsecured networks out there, and your phone can automatically connect to them, even if you are just passing by one.
  • Only download apps from trusted sources such as the Google Play store.
  • Don’t click on links that are from unknown senders in SMS messages or emails. They could be a part of a phishing scam.
  • Do regular software updates on all apps and your phone’s operating system.
  • Log out of any website that you conduct financial transactions on, from buying products on Amazon to checking your bank account balance.
  • Do regular backups of your phone. This will be helpful in the event that your device gets lost or stolen.
  • If your device happens to get lost or stolen, make sure you have software that allows you to remotely lock, and if necessary, wipe the data from your phone.
  • Install mobile security software on your phone as an extra layer of security.

Check Point’s Sandblast Mobile is the leading Mobile Threat Defense (MTD) solution, which provides complete threat detection and mitigation, full visibility, the best mobile catch rate and simply deployment. By integrating with all market-leading MDM/UEMs, Sandblast Mobile adds a critical layer of security to these solutions by covering all vectors of attack.

  • Protects workers using mobile devices from malware, Man-in-the-Middle attacks, OS exploits, and phishing attacks
  • Is powered by Check Point’s ThreatCloud, the largest IOC database in the world
  • Prevents phishing on all apps, on both known and unknown phishing sites
  • Completely assures user privacy and device performance

Register now to receive a FREE Check Point Sandblast Mobile Demo. CLICK HERE to learn how you can reduce your attack surface.

*The above is advice for personal use only. If you are looking for a Password Manager or a Privileged Access Management solution for a business, we would be happy to talk and to share with you our experience and technology solutions. Contact SEGMENTECH Today!