Securing Cell Phone Data

 

Imagine your cell phone turning into a spy agent and being used against you; it turns into a 24 hour surveillance device by copying your messages, harvesting your photos, and recording your phone calls. It can pinpoint where you are, where you’ve been, and who you have met (Pegg & Cutler, 2021). This is made possible by special hacking software named Pegasus. It was developed by the Israeli company NSO, and marketed & licensed to governments around the world. What makes this software even more intimidating is that it doesn’t require the user to click on a malicious message, or link, to infect your systems; it takes advantage of zero day vulnerabilities that rely on flaws or bugs in the phones mobile operating system. In 2019, over 1,400 cell phones were infected by a simple unanswered WhatsApp phone call (Pegg & Cutler, 2021).

For reasons like this, it is imperative that cell phones are also protected from viruses and malware, much like computers are. This is especially important when company cells phones are being used and attaching to your network. According to Tech Advisory, 2018, there are a few ways to keep viruses and malware off of your cell phone and the network:

o   Keep your mobile devices operating system up to date to improve the overall experience and to fix security vulnerabilities.

o   Make sure to only install business applications and no unauthorized apps.

o   Take extra care when connecting to public Wi-Fi networks to make sure no unauthorized users can connect to your cellular device.

o   Enable phone tracking tools to help with recovery in case the phone is lost or stolen.

o   Screen SMS messages very carefully, do not reply to unknown phone numbers, email addresses, or click on any unknown links.

o   There is also additional security software that you can purchase and install such as McAfee 24/7 Threat Protection, or additional encryption software to encrypt data while it is on the cell phone.

There are also a few policies that can be enacted to help keep companies cell phones and networks safe are: an Acceptable Use Policy or a Company Cell Phone Policy. An acceptable Use policy will highlight what is acceptable and unacceptable to do on the company cell phone, this would include downloading unauthorized apps, using social media apps, or requiring a VPN when connecting to public Wi-Fi networks. A Company Cell Phone Policy would also address any safety concerns of using cellular devices while at work, guidelines for using personal versus company cell phones at work, and if there are any privacy concerns with recording video, or audio while at work (Indeed, 2022). Policies and procedures like these will make sure all employees are aware of what is an acceptable way to use cellular devices while at work, or while connected to the company network. There is additional software that can be used to track and monitor things such as the latest IOS version, unauthorized apps, and would not allow connection to the company network without first being connected through a VPN. This software can be used to help monitor and enforce cell phone use policies and procedures in the workplace.

 

References

Cell phone at work policies [updated for 2022]. Cell Phone at Work Policies [Updated for 2022]. (n.d.). Retrieved April 18, 2022, from https://www.indeed.com/hire/c/info/cell-phone-work-policies

How to protect your company mobile devices. TechAdvisory.org. (2018, December 12). Retrieved April 18, 2022, from https://www.techadvisory.org/2018/12/how-to-protect-your-company-mobile-devices/

Pegg , D., & Cutler, S. (2021, July 18). What is pegasus spyware and how does it hack phones? The Guardian. Retrieved April 18, 2022, from https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones

Comments