One of the biggest benefits cited by iPhone users for their choice of device is that it has better security than the ubiquitous Android however that very security may well prove to be a vulnerability in itself.
Whilst it is true that in many ways the iOS is more secure than other operating systems it isn’t without its flaws and it is by no means immune to poor user behaviour.
The fact that the iPhone is so secure also leads users into a false sense of security and in turn, ironically makes it more vulnerable to attack!
In many ways, the iPhone is more secure than Android.
The lockdown nature of the OS and the closely guarded nature of information means that the likelihood of an attack is reduced.
By restricting access to app developers Apple has been able to ensure that every download is properly scanned for vulnerabilities.
Android devotees would point to the fact that there are many fewer apple devices in circulation which makes them a lower priority for malicious attack although given that some 15 million iPhones were sold in the US alone in 2020 that seems like grasping at straws.
But all that having been said, Apple has still had its problems, the latest of which, the Apple Wireless Direct Link (AWDL) vulnerability requires no direct intervention from the phone user.
The AWDL, which allows users to transfer files over WiFi allowed malicious users to gain control of the code of the phone and even use the microphone and camera.
Thankfully now fixed, the threat was sufficient to force Apple to actually admit to the vulnerability, something it generally tends to shy away from.
Arguably one of the main issues with the iPhone is owners’ perceptions of the level of security that is inherent in the device.
Sure, the iPhone is secure, but it can’t protect against every eventuality and user error is certainly one area ripe for exploitation.
The main problem is the user who hasn’t encountered any problems themselves or has heard talk of iPhones being immune to attack and that changes their behaviour.
People who feel secure tend to take more risks as in the case of the Cypres device designed to save skydivers from no-pull deaths.
In a no-pull death the skydiver fails to pull their ripcord or does so too late, the Cypres device was designed to eliminate this but actually failed to reduce the number of fatalities.
The reason was that people became used to the reduced risk so in turn began taking more risks to compensate thinking that they would still be safe.
In the same way, a user who has never experienced a malware attack and has heard that their phone is invulnerable will often have no hesitation clicking on a suspect link or downloading an unverified app.
In today’s interconnected world there often is no alternative to allowing user devices to connect to your systems. The advent of the pandemic has exacerbated this as people work at home more often and connect in from more and more remote locations.
There’s good evidence that the trend towards remote working will continue and many companies are actively seeking to reduce desk space in their main offices, meaning that we can expect people to be connecting using all sorts of different WiFi, many of them unsecured.
A user who has downloaded malware, or has a device that has been compromised will present a very real threat to the company’s main systems.
The first threat is that of a virus being introduced to other parts of the company network which could end up in a security or data breach or even a ransomware attack.
As users connect in from a compromised location they could end up being spied upon or having their passwords compromised through keylogging or man-in-the-middle attacks.
This could result in the situation where the business spends all of its time trying to prevent more spectacular attacks such as DDOS yet falling prey to a simple password and username hack.
In truth, it doesn’t matter what level of security a device has if the user ends up falling prey to phishing and spear-phishing attacks!
The thought that a business could lose cash from an attack on their bank account, customers through the reputational damage of a data breach or systems access due to a ransomware attack should be enough to make any business owner take action.
The first thing to do is to make sure that your users download updates and apply patches as soon as they are released.
Manufacturers like Apple spend a lot of time and money making sure that their OS is secured against attack but that can’t help if the device user refuses to update!
The second line of defence is to make sure your employees are connecting in a secure way.
Whilst we all know the risks of using public WiFi, it is also true to say that many home networks are just as vulnerable and with the power of home routers now being much greater than ever before it is a simple matter for a cybercriminal to park on a residential road and have access to several unsecured networks at a time.
Using an iPhone VPN will secure the employee’s connection and encrypt any data sent over the web.
A VPN makes sure that the connection can’t be intercepted and as a result malware downloaded onto the iPhone. It stops keylogging and man-in-the-middle attacks too.
Finally, employee education is vital.
Making sure that people understand that just because they have an iPhone doesn’t mean they are invulnerable is ultra-important.
Educating people about the ways that phishers work and why they need to update their phones is a simple, cheap and very effective way of reducing risk.
Protecting a business against unauthorised access is in many ways very simple and can be achieved for very little money and given the damage that could be done, makes total sense.
A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious actors…
SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce shoppers…
The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to malicious…
Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in 2022…
CVE-2024-52301 is a critical vulnerability identified in Laravel, a widely used PHP framework for building…
A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin, formerly…