Is Your Mobile Device Hackable? 7 Risks You Should Know

Posted November 07, 2017 by Jenny Green


report by eMarketer found that the UK is home to 43.6 million smartphone users in 2017.

The rise of the mobile workforce means increasing numbers of workers are using smart phones, laptops, and USBs to do their jobs – and it represents a huge potential for data breaches too.

While companies are used to putting safeguards in place in a physical workspace, it’s not as simple when devices and employees are off site.

Here are 7 ways a mobile device is most at risk of being hacked today.

  1. Theft or loss

Mobile devices are easy to carry around... but also easy to steal or forget in airports, restaurants, and cabs. Solutions: Emphasise secure work habits in ongoing training so that mobile devices are never left unattended or even in full sight in a locked car. According to the 2017 Security Tracker by Shred-it, encryption, strong passwords, and multi-factor authentication will help. Also, consider remote control software that can disable a lost or stolen phone.

  1. Unpatched device

The iPass Mobile Security Report 2017 identified unpatched operating systems as a significant threat. Solutions: Implement a comprehensive Mobile Device Policy, and keep operating systems and other programs updated. Security upgrades address known vulnerabilities.

  1. Tricky social engineering

Mobile security threats are often socially engineered. Cyber criminals try to trick victims via email scams or social networking sites into clicking on malicious links with infected malware. Solutions: Security awareness and training is critical so that everyone can recognise threats and avoid them. 

  1. Downloading infected apps

Apps are popular to help with business tasks and for personal use. But apps in general do not have enough security. Gartner reported that nearly 75% of security breaches are due to misconfigured appsSolutions: Alert everyone to this issue. In the workplace, consider vetting apps and issuing a list of approved apps.    

  1. Public Wi-Fi

Working in public spaces like coffee shops is risky especially if you use the free Wi-Fi. Hackers set up rogue Wi-Fi networks to trap people logging onto them to intercept data transmission.  Solutions: Never transmit sensitive information over public Wi-Fi. Provide staff with mobile packages that include data (so they don't have to use the WiFi), or a Virtual Private Network (VPN) that allows routing online activity through a secure, private network.  

  1. C-level executive

The iPass research showed that C-level executives are at the greatest risk of being hacked outside the office. Experts say they are not the typical 9-5 office worker, and often have unrestricted access to sensitive company data.  Solutions: Educate executives about threats, and limit mobile access to corporate data by C-level executives.

  1. Insiders

Malicious insiders use mobile devices to download sensitive information or use email to transmit data to external accounts. Solutions: Implement a Clean Desk Policy so confidential information is always protected. Avoid stockpiling old mobile devices. Destroy all unused hard drives using a third-party provider who has a secure chain of custody and confirms destruction.

Start Protecting Your Business 

To learn more about how Shred-it can protect your documents and hard drives, please contact us to get a free quote and data security survey.


Request a Quote

Fill out the form or call 0800 0114 to start protecting your business today! 

Select Service




Company info

Your info

Additional Info

×