mobile device security

      Rise Of Trojan Apps Highlights Mobile Device Security

      Anti-virus specialist Kaspersky Labs has reported that Q2 2018 saw the highest number of Trojan mobile banking malware instances ever recorded to date, highlighting the lack of mobile device security.

      Malicious Apps

      Trojan mobile apps are a rising threat. This malware poses as the legitimate app of a major bank, often found behind phishing emails and fake banner ads. When the user downloads and goes to login to their bank, the Trojan app copies their login details and sends them to cyber criminals.

      This type of activity is generally caught on a PC by antivirus or link scanner software. But mobile devices rarely have this level of security. Indeed, a worrying number of users have not even set a password on their phone or tablet.

      This poses a big threat to businesses. Often staff members will have access to work emails and systems on their personal phones. Should malware apps be given permission to access contacts (a common app request) then cyber criminals have access to a company’s email address book. This is a GDPR breach. And it’s the same situation should a user lose their phone without a password on it.

      Without monitoring of the devices connected to business IT systems, it’s nearly impossible to know if systems are compromised until it’s too late

      Mobile Device Security & Management

      It’s for this reason that Akita has developed IT security services like Mobile Device Management. Among its multitude of uses, it can enforce users to adopt security and passwords on their devices if they’re accessing work systems. This can even include the auto-deployment of anti-virus software that can detect malware on a phone.

      Mobile Device Management can also isolate work data held on phones (such as email, files or work-relevant apps) in their own folder. This can be password protected. Should a phone be lost or stolen, this folder can be remotely deleted from the phone, ensuring data isn’t lost.

      For more information about our cyber security services:

      Find Out More
      Back to feed