Mobile Device Security: Phishing, Mishing, and More

Blog banner with the title “Rising Risks, Proactive Defenses for Mobile Security,” spotlighting strategies for securing mobile devices in an increasingly connected world.

In 2023, one in four users clicked at least one phishing link every quarter. It’s a shocking statistic that underscores a growing problem: mobile devices are increasingly targeted by cybercriminals.

As the remote and hybrid workplace trend continues—and with upwards of two-thirds of employees using a smartphone for work—mobile devices have become many hackers’ first choice of attack.

This blog will explore the top risks facing mobile device security, why industries like manufacturing are particularly vulnerable, and actionable steps you need to take to protect yourself and your organization.

The Top Mobile Security Risks

Phishing and Mishing

    82% of phishing sites are designed to specifically exploit mobile users. 

    2024 Zimperium Global Mobile Threat Report

    Mobile phishing, or “mishing,” is evolving at a rapid pace. In fact, 82% of phishing sites are designed to specifically exploit mobile users. These attacks take many forms:

    Vulnerable Devices and Software

    Unpatched devices and outdated software are two more major issues. At any one time, an estimated 40% of mobile users are running outdated operating systems that harbor known vulnerabilities. Meanwhile, the number of Common Vulnerabilities and Exposures (CVEs) in Android and iOS devices continues to climb.

    Application Risks

    Applications can present significant risks to your mobile security, especially when downloaded from unofficial sources or when their permissions and behaviors aren’t thoroughly vetted. Here’s what you need to know:

    • Sideloaded Apps: These apps, installed outside of official app stores, often skip security reviews, making them a common source of malware and riskware.
    • Poorly Reviewed Apps: Many apps request excessive permissions, fail to encrypt communications, or contain hidden vulnerabilities that can put your data at risk.
    • Riskware: Some apps appear legitimate but include malicious features that can jeopardize your personal or professional data.

    Protect yourself by asking these questions before downloading an app:

    • Does the app come from a trusted source, like an official app store?
    • Are its permissions reasonable for its functionality?
    • Is your data encrypted while using the app?
    • Does the app’s developer have a solid reputation?

    Taking a moment to vet applications can go a long way in safeguarding your information.

    A bearded man in business attire focuses on his smartphone, emphasizing mobile device security for professionals managing sensitive data on the go.
    Network and Public WiFi Threats

    Unsecured networks and public WiFi open the door to man-in-the-middle attacks. Without proper safeguards, sensitive corporate data can be intercepted.

    Better to avoid these types of WiFi networks by using a VPN or your cellular provider’s network.

    The Rising Threat to Manufacturing

    Why Manufacturing is a Target

    Manufacturing environments rely heavily on mobile devices, especially for field workers operating across diverse networks. This, combined with a dependency on third-party apps and the prevalence of Android devices, creates a perfect storm for cybercriminals.

    Key Stats in Manufacturing

    • 80% of manufacturing employees work outside traditional office spaces.
    • 1,421 Android CVEs were detected in 2023, representing a 58% increase from the previous year. When final 2024 data is eventually reviewed, the expectation is an even higher number of CVEs for these devices.
    • Proofpoint reports that manufacturing employees are among the most susceptible to phishing attacks—about 25% higher than average.

    Best Practices for Mitigating Mobile Security Risks

    Awareness and Training

    Educate employees on identifying phishing attempts, avoiding suspicious links, and using apps securely. Training is the first line of defense against human error. Also, get in the habit of communicating reminders to your team when operating system updates are released, encouraging them to update their devices.

    Mobile Threat Defense Tools

    Leverage MTD tools to monitor iOS and Android devices. Microsoft Defender for Endpoint, Harmony Mobile, and GlobalProtect are all examples of MTD solutions.

    Stronger Authentication

    Adopt phishing-resistant multi-factor authentication (MFA) for accessing sensitive data and applications. Implement zero-trust security principles to ensure that only authorized users can access sensitive systems.

    Network Access Controls

    Block unpatched devices or those running outdated operating systems from accessing corporate networks.

    A professional woman in a gray suit stands near a window, engaging with a tablet, highlighting the importance of mobile device security in workplace environments.

    Take Charge of Your Organization’s Mobile Security

    The threats to mobile devices are real and growing. By understanding the risks, prioritizing employee awareness, and implementing the right security measures, organizations can better safeguard their sensitive data and operations.

    Looking for Further Help? Ask HBS

    Protecting your organization from mobile threats doesn’t have to be daunting. HBS offers expert guidance and comprehensive cybersecurity services that can be tailored to your needs.

    Let’s work together to secure your mobile workforce. Contact us today to get started.