top of page

3 ways to avoid getting phone hacked


3 ways to avoid getting phone hacked

You have probably seen in the news that high-net-worth individuals, famous athletes and entertainers are becoming favourite targets of phone hacking. In some cases, when security experts can’t agree, it’s because mobile device forensics is very limited even to confirm that someone has been compromised and reconstruct what exactly happened.


For business executives, it’s high time to pay attention to mobile security. The last thing you’d want is to be personally embarrassed or professionally compromised.


Mobile phones are becoming a fruitful and surprisingly easy target for hackers. It used to be that businesses issued their executives work phones that used only business applications. But today, our phones are just as likely to hold intellectual property memos as they are to be used for listening to music.


Hackers started by looking for salacious photos and embarrassing text messages. However, now they’ve moved to mobile malware, ransomware and identity theft aimed at penetrating corporate networks and exfiltrating mission-critical data held on the phones of CEOs, board members and political leaders.


Let’s be clear: Your organization’s most sensitive and proprietary data is at risk, in large part because you are routinely accessing it through your mobile phone. And the hackers know it. We must recognize the magnitude and potential impact of this problem and take decisive steps to bolster our cyber defence.


Mobile Phone Security Threats Are Evolving

When we rely on our mobile phones for work tasks, we expand the cybersecurity threat landscape. This is critical to acknowledge because most organizations not only lack a proper understanding of mobile phone threats but also require experienced personnel to address the problem with anything more than essential mobile device management tools.


Avoid getting phone hacked

There are two significant challenges associated with mobile cybersecurity threats:


The Wolf in Sheep’s Clothing. The sheer number of applications we can use on our phones is exploding. Apple and Google are doing excellent work with securing their operating systems, but securing third-party applications remains a big challenge. We’ve added much functionality to our phones, but much of those added features have made it far easier for bad actors to access things like our work contacts and their phone numbers. As hackers work their way into our phones through fraudulent applications which suddenly develop a second life or exploiting vulnerabilities in typical applications like WhatsApp, it’s not a big leap to installing professional malware for jailbreaking, espionage, ransomware or data exfiltration.


No Place Left to Hide. I’ll spare you the technical details, but keep in mind that mobile networks rely on vulnerable roaming protocols like SS7 or Diameter, which are easy targets for cyber threats. Merely having access to your phone number allows hackers with a little investment to trace your location quite easily … or even to take over your incoming calls or text/SMS or WhatsApp messages. These attack methods have been used for a long time, not only for professional espionage but also for large-scale online banking fraud. This is also the reason why banks don’t consider SMS as a secured two-factor authentication approach anymore. All in all, it’s challenging to protect yourself against location tracking or phone or SMS takeover attacks.


But, the good news is that the state of mobile phone cybersecurity is not as bleak as it sounds from the press. Today’s mobile phones, at the device level, have robust security architectures. The ecosystems for the most popular phones—Apple iPhone and Google Android—are highly secure, with strong hardware-based security and isolation approaches. And, unlike other software exploits, exploit code to compromise a mobile device without your interaction would cost attackers millions. A hacker has to make a massive investment if he wants to compromise your mobile phone to exfiltrate your data.