Securing Cell Phone Data
Imagine
your cell phone turning into a spy agent and being used against you; it turns
into a 24 hour surveillance device by copying your messages, harvesting your
photos, and recording your phone calls. It can pinpoint where you are, where
you’ve been, and who you have met (Pegg & Cutler, 2021). This is made
possible by special hacking software named Pegasus. It was developed by the
Israeli company NSO, and marketed & licensed to governments around the world. What
makes this software even more intimidating is that it doesn’t require the user
to click on a malicious message, or link, to infect your systems; it takes
advantage of zero day vulnerabilities that rely on flaws or bugs in the phones
mobile operating system. In 2019, over 1,400 cell phones were infected by a simple
unanswered WhatsApp phone call (Pegg & Cutler, 2021).
For
reasons like this, it is imperative that cell phones are also protected from
viruses and malware, much like computers are. This is especially important when
company cells phones are being used and attaching to your network. According to
Tech Advisory, 2018, there are a few ways to keep viruses and malware off of
your cell phone and the network:
o Keep your mobile devices
operating system up to date to improve the overall experience and to fix
security vulnerabilities.
o Make sure to only install
business applications and no unauthorized apps.
o Take extra care when
connecting to public Wi-Fi networks to make sure no unauthorized users can connect
to your cellular device.
o Enable phone tracking tools
to help with recovery in case the phone is lost or stolen.
o Screen SMS messages very
carefully, do not reply to unknown phone numbers, email addresses, or click on
any unknown links.
o There is also additional
security software that you can purchase and install such as McAfee 24/7 Threat
Protection, or additional encryption software to encrypt data while it is on
the cell phone.
There are also a few policies
that can be enacted to help keep companies cell phones and networks safe are:
an Acceptable Use Policy or a Company Cell Phone Policy. An acceptable Use
policy will highlight what is acceptable and unacceptable to do on the company cell
phone, this would include downloading unauthorized apps, using social media
apps, or requiring a VPN when connecting to public Wi-Fi networks. A Company
Cell Phone Policy would also address any safety concerns of using cellular
devices while at work, guidelines for using personal versus company cell phones
at work, and if there are any privacy concerns with recording video, or audio
while at work (Indeed, 2022). Policies and procedures like these will make sure
all employees are aware of what is an acceptable way to use cellular devices
while at work, or while connected to the company network. There is additional
software that can be used to track and monitor things such as the latest IOS
version, unauthorized apps, and would not allow connection to the company
network without first being connected through a VPN. This software can be used
to help monitor and enforce cell phone use policies and procedures in the
workplace.
References
Cell phone at work policies
[updated for 2022]. Cell Phone at Work Policies [Updated for 2022]. (n.d.).
Retrieved April 18, 2022, from
https://www.indeed.com/hire/c/info/cell-phone-work-policies
How to protect your company
mobile devices. TechAdvisory.org. (2018, December 12). Retrieved April 18,
2022, from
https://www.techadvisory.org/2018/12/how-to-protect-your-company-mobile-devices/
Pegg , D., & Cutler, S.
(2021, July 18). What is pegasus spyware and how does it hack phones? The
Guardian. Retrieved April 18, 2022, from
https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones
Comments
Post a Comment