Mobile Messaging Made Easy

Text marketing’s 98% engagement rate means your messages will be read and responded to — fast. No other channel comes close.

START 14–DAY FREE TRIAL

Mobile Devices Mostly Impervious to Hackers, say Verizon

mobile_money_transfers
15
Sep
Mobile Devices Mostly Impervious to Hackers, say Verizon

hackers
Mobile has revolutionized the tech industry, creating as many new businesses as it has destroyed old ones. In the past decade, a ‘marketing strategy’ has turned into a ‘digital marketing strategy’ before morphing swiftly into a ‘mobile marketing strategy’ and it’s left countless heads spinning. 

Oddly, there is one perennial area of concern for the industry that has remained largely untouched by the smartphone: hacking. 

According to a recent report from Verizon, mobile devices are seldom used by hackers to commit their nefarious deeds, which is not all that surprising, given the limitations of inputting complex code into small-screen devices. Perhaps more surprising is just how few mobile devices are targeted by hackers. 

The Data Breach Investigations Report (DBIR) is Verizon’s annual paper on cybersecurity issues. This year’s DBIR has concluded that “mobile devices are not a preferred vector in data breaches.” In other words: criminals use laptops and desktops to hack into networks.

The report draws on data from tens of millions of mobile devices on Verizon’s own network. It found just 0.03% of tablets and smartphones were infected with serious malware - significantly below the 0.68% rate of infection from unwanted software affecting non-mobile devices. 

That’s not all the good news. The few infections that make it through to our phones are generally less serious than the types of spyware and malware affecting our computers. The lion’s share of ‘successful’ mobile viruses were relatively harmless pieces of ‘adnoyance’ software, which are aimed at trying to direct users to purchase security packages and other money-making schemes, or collect personal data. These types of infection are also much easier to spot than the more malicious desktop infractions. 

Apple users won’t be surprised to learn that the vast majority of infections were found on open-source Android devices. In fact, most suspicious activity logged on iOS devices were failed ‘hit and hope’ scams aimed at Android users. 

This information, while reassuring, is not an excuse for lax security practices. But it does suggest the new model of closed, app-based software - designed to be impervious to hackers - is working, and that can only be a good thing. As more and more online activity is conducted via mobile devices, the tolerance for security breaches will (hopefully) continue to plummet. 

Share: Facebook LinkedIn Twitter Email

Recent Blog Posts

Smishing
15
Sep

How to Help Your Business and Customers Avoid Text Smishing Scams

As if 2020 wasn’t delivering us enough to contend with. Now, many of us are receiving unwanted SMS text scams (supposedly, but not really) from USPS...
Learning Pods
15
Sep

How Texting Enhances Learning Pods

As the parent to a kindergartener in a district with all-remote learning in place, I’ve witnessed firsthand the number of learning pods pop up in our...
Hiring
04
Jun

Don't Miss a Perfect Recruit: Personalize the Hiring Process with SMS

“Often, the mavericks who've skipped the box-ticking in life are the ones we're seeking.” So explains Dawn Graham — a highly sought-after career coach...
SMS Texting for Marketing & Sales

Introducing New Generative AI Features!

Now it’s even easier for your team to connect with your audience and collaborate on inbound messages. Yes, that means fewer missed messages!
Welcome to texting transformed.

TEAM INBOX: Assign and collaborate on 1:1 messages, enabling faster problem resolution through streamlined teamwork. Start Here
AI REPLY: Drastically reduce two-way texting response time by letting AI handle inquiries - faster, smarter, better! Start Here
AI COMPOSE: Craft captivating mass messages to start and continue conversations with generative AI. Start Here