We perform more and more professional or productivity-related tasks with our cell phones, which involves the use of sensitive information. Know the main vulnerabilities of your smartphone and take note of the 10 tips we offer from Sofistic to combat them.

There is no doubt that the smartphone has become an essential part for all of us. On the personal side, it has helped us a lot during the pandemic to stay connected with our family and friends, but also to enjoy those moments of leisure with social networks, videos or games. However, its use is also increasing for other more productive tasks, such as basic medical procedures or access to our bank accounts. On the professional side, there is no doubt of its usefulness, with access to professional applications or document management. Where we find a coincidence is in email management, as it is one of the first actions when configuring a smartphone, adding as many accounts as we have.

The point is that, as time goes by, smartphones contain more important information for us, and we are not always aware of it. What if someone has access to my emails? What if someone has access to my SMS or WhatsApp/Telegram type programs? What if screenshots are taken or keystrokes recorded? What if calls are made without my consent?

What are the main risks of a smartphone?

There are multiple methods to infect a smartphone, either because we install an illicit or fraudulent app (sometimes it is not even necessary to leave the official store), or because someone has access to our device remotely taking advantage of some unknown vulnerability of the operating system (as in the case of Pegasus) or because we access a fraudulent website that infects us without realizing it.

According to the latest studies of attacks on smartphones, fewer attacks have been detected, although it is worth mentioning that these have been found to be much more sophisticated and harmful to users.

Imagen 1: número de ataques a dispositivos móviles.

Number of attacks by mobile devices.