Mobile Security

Mobile Devices: Time to Manage and Monitor

In Tech Blog by Michael Kierman

Phone Vulnerabilities Exposed

Mobile device usage is becoming increasingly work-based. Whether it’s a personal device or work issued, employees are relying more and more on their iPhone and Android devices to conduct business. So with personal and work contacts, work related exchanges, and work applications loaded on your phone, which one offers the safer product. Here at AVATAR Computing in Worcester, MA, we attempt to find solutions to problems before they arise – remaining proactive, as the need for mobile security increases.

At of the end of 2017, Apple’s iPhone OS had 387 distinct vulnerabilities identified. Some of these vulnerabilities were sizable threats for users . . . two of which enabled a malicious application to inject arbitrary code with kernel privileges. In other words, it could enable the bad guys take complete control of your device. Yikes!

And then there’s Google’s Android OS. Bad news for Android fans. With a total of 841 vulnerabilities identified, Android led the pack for vulnerabilities last year. Many of these patches were severe and welcomed attackers who may use a “specially crafted file to execute arbitrary code within the context of a privileged process,” Google warned in its advisory.

2018 has started off to a busy start for both devices. Either Android or iPhone, AVATAR Computing recommends working with your local IT provider to install Mobile Device Management (MDM) software on all devices used for work related tasks. Make sure to ask your trusted technician for more information.