Venues required by law to record contact details
Venues required by law to record contact details Recording Contact Details The Governments’ new requirements for businesses mean that premises…
Most, if not all business professionals use smartphones some even have two, one specifically for business purposes and the other for personal.
With greater use of mobile devices comes a greater chance of malware attacks. MacAfee identified an increase in widespread and more sophisticated mobile malware attacks. According to their Labs Threats Report, mobile malware attacks have almost doubled since 2016.
Similar to PC Malware attacks, hackers send malicious links and attachments via email or text. These links when pressed then give the hacker access to your device and all the information on it, such as login details bank information.
Apps are also used to hack devices, cybercriminals are highly skilled and often design apps, that’s on the surface look legitimate. The apps are often free and maybe for a game or utility app to improve productivity. When you download those apps, you are opening yourself up for a cyber-attack.
Do not click on suspicious-looking links or download attachments from an unknown email. If an email is from someone you know, but you were not expecting a link or attachment give them a call to double-check it is genuine.
If you offer your team members work phones have a ‘list of approved apps’ this reduces the chance of illegitimate apps being downloaded.
If individuals want to download apps that are not on the approved list, they must obtain permission. Ensure there is a clear procedure in place to request permission.
Make sure your firm has cybersecurity monitoring tools to check for signs of unusual activity.
Train your team, so they can spot suspicious emails and avoid clicking on them. It is worth having regular training, the cyber world is forever evolving, so it is vital to ensure staff are trained regularly.
Assign someone in your team the role of cybersecurity monitor. This means they are accountable for hacks and will know exactly what steps to take on a corporate level to ensure it doesn’t happen again.
Did you find this blog useful? Sign up for our newsletter (here) to receive fresh content directly to your inbox once a month.