American Express Business Class Logo
  • Videos
    Business Platinum Membership Rewards: Earn & Redeem
    1 min watch
    Business Platinum Travel Benefits
    1 min watch
    No Preset Spending Limit
    1 min watch
    Pay Over Time
    1 min watch
    Julie Pauly, The Able Baker, Maplewood, NJ
    3 min watch
    Articles
    How Using a Business Credit Card Can Help Your Small Business
    5 min read
    Safeguarding Security, Unlocking Innovation: Exploring The New Era In B2B Payments
    15 min read
    Getting More Back from What You Spend: Unlocking Value with Business Platinum
    4 min read
    Virtual Cards 101: What Is a Virtual Credit Card and Why Might You Need It?
    6 min read
    What Is a Business Line of Credit?
    12 min read
    Testimonials
    The Perfect Pairing: With American Express Business Blueprint™ and Resy, the Gourmet Brunch Potential is Bottomless
    9 min read
    Raising the Standard: How American Express Helps Power the Legacy of Electrolift Inc.
    10 min read
    How a Mother-Daughter Team Designed Their Dream Business with Help from American Express
    7 min read
    How Amex Business Products Helped Smart Birdy Take Flight
    5 min read
    Prescription for Progress: How Sree Gari Took His Pharmacy Further with Support from American Express
    6 min read
  • Cash Flow
    Accounting
    Critical Numbers
    Saving Money
    ROI
    Account Receivable Payable
    See All Cash Flow
    Financing
    Raising Capital
    Loans
    Alternative Financing
    Self-Financing
    Venture Capital
    See All Financing
    Growth Opportunities
    Business Expansion
    Innovation
    Franchising
    Partnerships
    Importing & Exporting
    See All Growth Opportunities
    Strategy
    Driving Business Efficiencies
    Product Development
    Business Plan
    See All Strategy
  • Celebs Talk Business
    Patti Labelle Talks Digital Transformation
    2 min watch
    Nick Offerman Talks Supply Chains
    3 min watch
    Patti Labelle Talks Expense Management
    2 min watch
    Nick Offerman Talks Spend Capacity
    3 min watch
    See All Celebs Talk Business
    Small Business Stories
    Pascal and Daneen Lewis, Harlem Wine Gallery, New York, NY
    3 min watch
    Julie Pauly, The Able Baker, Maplewood, NJ
    3 min watch
    Maria Christie, Christie’s Seafood & Steaks, Houston, TX
    7 min read
    Alex Magruder and Julia Schnabel, The Little, East Hampton, NY
    9 min read
    See All Small Business Stories
  • Small Business
    Membership Rewards
    1 min watch
    Employee Cards
    1 min watch
    Travel Benefits
    1 min watch
    No Preset Spending Limit
    1 min watch
    Pay Over Time
    1 min watch
    Corporate
    Common Business Expenses and the Credit Cards That Can Help You Manage Them
    5 min read
    What Is Corporate Travel Management and Why Do You Need It?
    8 min read
    Virtual Cards 101: What Is a Virtual Credit Card and Why Might You Need It?
    6 min read
    Product Videos
    Let’s Talk Business Travel: Airports
    1 min watch
    Let’s Talk Business Travel: Hotels
    1 min watch
    Employee Cards
    1 min watch
    Membership Rewards
    1 min watch
    Member Resources
    How to Engage With Online Communities
    7 min read
    Earning and Using Membership Rewards® Points with Business Platinum
    6 min read
    4 Ways to Optimize Corporate Travel Management
    5 min read
    How to Calculate Net Income
    6 min read
    American Express Membership Guide: Backing Your Business, Backing You
    6 min read
  • amexLogo
    • Getting More Back from What You Spend: Unlocking Value with Business Platinum

      1 min read
    • How Using a Business Credit Card Can Help Your Small Business

      5 min read
    • Business Platinum Travel Benefits

      4 min watch
    • Cash Flow
    • Financing
    • Growth Opportunities
    • Strategy
    • Celebs Talk Business
    • Small Business Stories
    • Earning and Using Membership Rewards® Points with Business Platinum

      6 min read
    • American Express Membership Guide: Backing Your Business, Backing You

      6 min watch
    • Let’s Talk Business Travel: Airports

      1 min watch
  • amexLogo
    • Getting More Back from What You Spend: Unlocking Value with Business Platinum

      1 min read
    • How Using a Business Credit Card Can Help Your Small Business

      5 min read
    • Business Platinum Travel Benefits

      4 min watch
    • Cash Flow
    • Financing
    • Growth Opportunities
    • Strategy
    • Celebs Talk Business
    • Small Business Stories
    • Earning and Using Membership Rewards® Points with Business Platinum

      6 min read
    • American Express Membership Guide: Backing Your Business, Backing You

      6 min watch
    • Let’s Talk Business Travel: Airports

      1 min watch

Digital Tools

6 Best Practices for Cell Phone Cybersecurity

6 Best Practices for Cell Phone Cybersecurity

Related Content

Loading...
Loading...
Loading...
Loading...
Summary
Email Icon
Facebook Icon
Twitter Icon
LinkedIn Icon

With more and more people using smartphones, cell phone cybersecurity is vital to the safety and success of your business.

Julie Bawden-Davis American Express Business Class Freelance Contributor
June 15, 2023

      According to a Pew Research report published in 2019, 96 percent of Americans "own a cell phone of some kind." So it stands to reason that your employees have conducted business for your company on their phones. Phones can be vulnerable to hacking, which makes cell phone cybersecurity worth considering.

      People often become lax when it comes to cell phone cybersecurity. They may not think about how they have a minicomputer full of sensitive data on their person.

      Mobile phone hacks have made headlines. Jeff Bezos’s phone was reportedly hacked when the president of Amazon clicked a video in a popular app. Likewise, the Twitter account of the company’s CEO, Jack Dorsey, was compromised. The hackers SIM-swapped Dorsey’s phone (that is, they took over his number) to gain control of his account.

      Cell Phone Hacking on the Rise

      “SIM-swapping is growing in frequency,” says Stephen Hyduchak, CEO of <a href="http://www.goaver.com/" rel="nofollow">Aver, an identity-verification service. “Fraudsters call your cell phone provider and social engineer the representative to trick them into thinking it’s you. Then they import your number in a new SIM to a burner phone. This allows them access to your email and accounts.”

      The 2019 Data Breach Investigations Report by Verizon noted that “research points to users being significantly more susceptible to social attacks they receive on mobile devices. This is the case for email-based spear phishing, spoofing attacks that attempt to mimic legitimate webpages, as well as attacks via social media.”

      Conducted from November 2017 to October 2018, the Data Breach Investigations Report analyzed breach incidents converted into the VERIS framework. The study found various reasons for cell phone vulnerability. These include the fact that “mobile devices have relatively limited screen sizes that restrict what can be accessed and viewed clearly. Mobile OS and apps also restrict the availability of information often necessary for verifying whether an email or webpage is fraudulent.”

      Cell Phones Riskier Than Computers

      Users often erroneously think that cell phones are just as safe as computers, believes Rick Ferreira, owner of <a href="http://www.kmftechs.com/" rel="nofollow">KMF Technologies, a network consulting company specializing in data retention and security.

      Inform your employees that phishing is also an issue on mobile devices... Advise they don’t open random links in emails or texts from financial, retail [or] business contacts.

      —Zach Ferres, CEO, Coplex

      “Consider the fact that users generally don’t proactively set up their phones the same way as their computers. Antivirus/firewall isn’t typically installed,” says Ferreira. “Security measures from application software providers have also not kept pace with security.”

      It is common for cell phones to be used for a wide variety of  business tasks, including booking travel.

      “Travel itineraries of high-level executives are considered sensitive, but their mobile devices are always with them, frequently sharing their locations, collecting their contact information, and perhaps most concerning, sharing information via cameras and microphones,” says Ted Wagner, vice-president and chief information security officer at SAP NS2, which provides cybersecurity and secure cloud solutions.

      “There are plenty of mobile phone apps that seem harmless but have many security flaws. They act like malware or spyware on your mobile device,” adds Zach Ferres, CEO of venture builder Coplex.

      "BYOD" and Cell Phone Cybersecurity

      “The challenge for businesses is the BYOD (bring your own device) culture of the modern workplace,” says Ferres. “This policy leaves company networks vulnerable to the poor digital security practices of individual employees. It’s important to remember that insecure devices connected to a secure network bring their insecurities with them, making the entire network vulnerable.”

      For people who handle sensitive company information, a BYOD policy is probably not the best approach, believes Ferres.

      “It might be necessary for such employees to have a separate company phone with IT enforced securities installed," he advises. "These devices should only be used for business purposes and never connected to public WIFI.” 

      Recommended Cell Phone Cybersecurity Measures

      Keeping your company data and employees as protected as possible takes changing mindsets about mobile phones.

      “The truth is any device connected to the internet is vulnerable to attack," says Ferreira. "It’s important to take all necessary steps to keep information safe.”

      Consider training your employees in the following cell phone cybersecurity protocols.

      1. Ensure phones are locked.

      “Enabling strong passcodes or using the biometrics—face or fingerprint—features on newer devices can ensure that if you or your employees lose phones, all the personal and professional data is locked down,” says Ferris.

      2. Avoid public WIFI.

      “Public connections are not secure. All the information transmitted is accessible by anyone else connected to the network,” says Ferres. “If you or employees need to work from a public space, consider using a VPN instead.” (A VPN, or a virtual private network, uses public networks to connect remote users to a private one, usually the company's own network.)

      3. Train employees regarding phishing scams and spam.

      “Inform your employees that phishing is also an issue on mobile devices,” says Ferres. “Instruct them to be mindful about mobile phone cybersecurity. Advise they don’t open random links in emails or texts from financial, retail [or] business contacts. Have them instead go directly to the website and sign in there.”

      4. Require two-factor authentication and strong password guidelines.

      “Instruct employees not to reuse passwords over multiple accounts,” says Ferres. “Require messaging encryption, anti-virus software and even restrict what websites and apps can be used while connected to the secured company network.”

      5. Consider using one type of mobile device and manage it centrally. 

      “Having employees use one type of mobile device can allow for tight control, down to managing the apps available on the mobile device,” says Wagner.

      “This mobile phone cybersecurity solution forces employees to only use their corporate mobile device for corporate functions,” continues Wagner. “Or consider technical solutions that enable separating personal functionality and corporate functionality on the same mobile device.”

      6. Use a mobile device manager.

      “Many organizations use mobile device managers to protect cell phone data,” says Wagner. “Some require applying Conditional Access Policies (CAP), which can be cumbersome to implement.”

      There are also cloud-based security systems to enhance cell phone cybersecurity, notes Ferreira.

      “Such technology allows access to company data within employee phones that can be eliminated when necessary without needing to wipe the phones.”

      Read more articles on mobile.

      Photo: Getty Images

      American Express Business Class Logo
      Share This Story
      Email Icon
      Facebook Icon
      Twitter Icon
      LinkedIn Icon

      Published: March 20, 2020

      Updated: June 15, 2023


      Want to Dig Deeper?


      Trending Content