Encrypted: The Personal Side to Cybersecurity

Hackers are gaining access to mobile devices regardless of users clicking on a link. This leads to the question: People are asking these days: are my devices safe, are the apps I’m downloading secure, and how can I protect myself and my data?

Christopher Novak, the Global Director for the Threat Research Advisory Center with Verizon, provided some thoughts and insights on these concerns and provided some tips and best practices on what people should be doing to keep their mobile devices secure.

“From a security standpoint, we are always looking for there to be a hack or attack kind of angle for just about everything,” Novak said. “So naturally, when these big outages occur (like the recent outage at Facebook), they attract a lot of attention.” And while the current information on hand points to an internal issue, and not a cyberattack that brought Facebook down on October 4th, it raises the concern of many people about the safety of their data.

And these security concerns weren’t helped by the recent Apple malware attack called CVE-2021-30860, which could operate undetected to the user and potentially grab personal data. And While not every cyberattack is something a device user can protect themselves against, Novak said some best practices could safeguard many security risks.

“A couple of things that immediately come to mind,” Novak noted. “Number one: avoid rooting your device.” Sometimes called ‘jailbreaking,’ a user breaks out of some of the manufacturer’s core settings to do different things with the device; however, this can cause security failures built into the device’s core settings.

“Another one I always recommend is multi-factor identification. This way, if someone does get access to some of your information, or they learn your password, that’s not enough for them to get into your accounts or your devices.”

View Verizon Business’ Resources for more helpful and engaging content.

Follow us on social media for the latest updates in B2B!

Image

Latest

IT
Real-World IT Practices Are Streamlining AV Deployments and Raising the Bar for Consistency
December 4, 2025

For years, the AV industry has discussed the long-anticipated convergence with IT—but that shift is no longer theoretical. With cloud adoption accelerating, hybrid work normalizing, and organizations rebuilding digital infrastructure after years of rapid change, AV systems now sit squarely on the IT backbone. In fact, the majority of newly upgraded conference rooms require network-centric…

Read More
ROI
ROI Case Study
December 3, 2025

Denials are no longer a slow leak in the revenue cycle—they’re a fast-moving, rule-shifting game controlled by payers, and hospitals that don’t model denial patterns in real time end up budgeting around losses they could have prevented. PayerWatch’s four-digit, client-verified ROI in 2024 shows what happens when a hospital stops reacting claim by…

Read More
coverage
Clip 2 – Fighting for Coverage: One Patient’s Story
December 3, 2025

Health insurers love to advertise themselves as guardians of care, but the real story often begins when a patient’s life no longer fits neatly into a spreadsheet. In oncology especially, “coverage” isn’t a bureaucratic checkbox—it’s the fragile bridge between a treatment that finally works and a relapse that can undo years of grit…

Read More
educator advocacy
Just Thinking… About How Rapid Shifts in AI and Policy Are Elevating the Need for Educator Advocacy in Texas Schools
December 3, 2025

Schools today are navigating a whirlwind of change, from new expectations in the job market to the growing influence of AI and the constant push to rethink accountability. That’s why conversations about educator advocacy matter so much right now. Texas, for example, ranks among the lowest ten states in per-pupil funding—even while boasting the seventh-strongest…

Read More