In a mobile world, it is important to conduct a risk analysis of whether a person may be a target of an attack on their phone. A number of vulnerabilities have been utilized over the years, such as Pegasus, that allow for remote access to phones; all the end user has to do is click a bad link, and the threat is placed on their phone. Your personal information will be compromised, and if you use it for work, your company’s information is now at risk too.
Here are some steps one can take to reduce the exposure to phone-based attacks, depending on the level of risk…
Procedural Security: Reduce the amount of information that could be stolen
Technical Security: Reduce vulnerability to attack by malware
Physical Security: Keep the phone within your control