Mobile working: Why hackers love it so much

Mobile working is the open flank of IT: It makes infrastructures that are actually secure vulnerable and vulnerabilities exploitable. The following article shows the most common gateways.

Smartphone secured? Mobile working provides hackers with many points of attack. (Image: Unsplash.com)

Most of the time, hackers set the pace. They are fast, ruthless and often have the most sophisticated tools for their advanced attacks. For companies, the challenge is not only to counter the threats with the appropriate technologies, but to stay one step ahead of cybercriminals themselves. Factors such as home offices and mobile working, which have developed rapidly recently, make this more difficult. This is because mobile communication outside the company network creates completely new attack surfaces. To ensure data protection, the security of mobile devices and the integrity of data transfers, companies need to know the biggest risks - and contain them from the outset. Communications provider Materna Virtual Solution shows the ways in which dangers to corporate data are imminent. The company develops and sells the applications SecurePIM, SecureCOM and the security architecture SERA for iOS and Android.

  • Questionable Apps. According to Materna Virtual Solution, there is still a great danger lurking in the app stores of the major providers. Applications that open the door to malware after installation or read out confidential data are still among the main reasons for data leaks. But even everyday apps from well-known manufacturers, such as popular messengers, can become a problem if the privacy settings are incorrectly selected. They are then able to access sensitive data and possibly pass it on.
  • Unpatched vulnerabilities in operating systems. If security vulnerabilities in applications and operating systems remain unaddressed, for example because they are unknown to the manufacturer, cybercriminals have an easy game. These so-called zero-day attacks exploit the undetected vulnerability to steal data or inject malware.
  • Phishing attacks. In addition to technological risks, employees themselves are still a frequently chosen and lucrative target for attackers. Calls to action in fake emails, short messages or websites tempt employees to disclose confidential data, such as passwords. Also due to the increasingly advanced phishing methods, employees should receive regular training on this type of attack.
  • Unprotected networks. Working in a café or hotel has long been commonplace, but all too often employees still use open WLANs or hotspots. What seems convenient at first glance, however, plays into the hands of potential attackers: unencrypted communication allows them to intercept data and steal sensitive information. 

"For ultra-mobile working to work, employees need to access data from anywhere and at any time," explains Christian Pohlenz, Security Expert at Materna Virtual Solution. "And that's exactly the crux of the matter, because getting from A to B involves numerous vulnerabilities. That's exactly why hackers love the new working models so much. The answer to this is end-to-end encryption. Container solutions have proven to be the measure of all things: They create a shielded area on mobile devices that is protected from access and ensures maximum security - and are thus a big step ahead of the hackers' tricks."

Source and further information: Materna Visual Solutions

(Visited 201 times, 1 visits today)

More articles on the topic