Here is a scary fact: According to one recent study, 47 percent of businesses that were surveyed had at least 1,000 sensitive files exposed to every employee while 22 percent of companies had 12,000 or more.
Does this sound a bit like your organization? Chances are likely that your employees have sensitive data floating around on their mobile devices, which could be easily extracted by a sophisticated hacker.
Unfortunately, smartphones are highly vulnerable to hacking. Here are three unexpected ways that a hacker could break into a mobile device and lift information for personal gain:
Number spoofing: What’s the easiest way to break into someone’s phone? As it turns out, you don’t have to breach their device at all. Now, hackers can download a spoofing or caller ID application to mask their telephone number and assume someone else’s. Hackers could use this strategy to trick employees into surrendering sensitive information via SMS.
Motion orientation sensors: Smartphones contain a major security flaw, in that mobile websites and applications do not need special permissions to access motion and orientation sensors.
As explained in Android Authority, hackers are now using device positioning and movement sensors to hack passwords. When a user taps, scrolls or presses on a screen, in other words, each movement will cause the person to hold the device a certain way and it can be easily observed by a snooping third party. This information is very valuable to a hacker. In one study, hackers were able to hack four-digit PINS with 70 percent accuracy the first time around, and 100 percent accuracy the second time.
Masterprints: Here at VoiceVault, we maintain that fingerprint sensors — though effective most of the time — should only be used in conjunction with other authentication solutions like voice biometrics. This is because they can be vulnerable to attacks. Researchers, for instance, recently discovered that smartphone fingerprint sensors could be fooled up to 65 percent of the time by “master prints” which are digitally rendered from common fingerprint readings.
So take our advice: It’s time to fortify your business’s mobile end points before one of your employees’ phones gets hacked.