A practical example
Let’s take a look at a real-world example of cyber risk exposure. Most of us nowadays carry smartphones in our pockets. These mobile devices have a computing power 100,000 times that of the technology used to land the first man on the moon. In most cases, our personal mobile devices also serve as a gateway into your business network. Most people receive emails from their employers on their smartphones.
People don’t realize that their mobile phones are, in most cases, an open front door to the inner workings of the company for which they work.
In 2021, CISO magazine published the results of organizational threat surveys. According to the findings, cybercriminals used mobile threats in a variety of ways to attack 97% of organizations.
Employees not only bring their phones to work, but they also use them to send work emails, store corporate data, and call clients and partners.
Some of the recent hacks that have had a significant impact on people include hacking social media accounts, accessing a mobile device, and allowing a disgruntled employee to publish racial slurs on his social media account—despite being exonerated in the end, the user spent time in prison following his arrest and spent several thousand Rand on legal fees. His reputation, on the other hand, has been harmed and will continue to be harmed because not everyone is aware that he was innocent, and that part of the news is usually in small print somewhere on page 11 of the newspaper. We’ve seen how revenge postings, such as intimate photos and videos, have ruined people’s reputations in our own country and around the world. Not to mention the thousands of people who are still attempting to clear their names after cybercriminals stole their identities and used their credentials to rack up massive bills.
So, what can we do to avoid becoming a victim of cybercriminals?
Cybercriminals use a variety of attack vectors to hack mobile phones.