Encrypted: The Personal Side to Cybersecurity

Hackers are gaining access to mobile devices regardless of users clicking on a link. This leads to the question: People are asking these days: are my devices safe, are the apps I’m downloading secure, and how can I protect myself and my data?

Christopher Novak, the Global Director for the Threat Research Advisory Center with Verizon, provided some thoughts and insights on these concerns and provided some tips and best practices on what people should be doing to keep their mobile devices secure.

“From a security standpoint, we are always looking for there to be a hack or attack kind of angle for just about everything,” Novak said. “So naturally, when these big outages occur (like the recent outage at Facebook), they attract a lot of attention.” And while the current information on hand points to an internal issue, and not a cyberattack that brought Facebook down on October 4th, it raises the concern of many people about the safety of their data.

And these security concerns weren’t helped by the recent Apple malware attack called CVE-2021-30860, which could operate undetected to the user and potentially grab personal data. And While not every cyberattack is something a device user can protect themselves against, Novak said some best practices could safeguard many security risks.

“A couple of things that immediately come to mind,” Novak noted. “Number one: avoid rooting your device.” Sometimes called ‘jailbreaking,’ a user breaks out of some of the manufacturer’s core settings to do different things with the device; however, this can cause security failures built into the device’s core settings.

“Another one I always recommend is multi-factor identification. This way, if someone does get access to some of your information, or they learn your password, that’s not enough for them to get into your accounts or your devices.”

View Verizon Business’ Resources for more helpful and engaging content.

Follow us on social media for the latest updates in B2B!

Image

Latest

Energy
Buy, Build & AI: Your New Software Strategy for Energy Leaders
February 3, 2026

Energy companies are running into a hard truth: the old “buy vs. build” debate no longer fits today’s reality—especially as AI moves from experiment to expectation. A modern software strategy must now account for cloud-native, modular ecosystems, where open APIs, integrations, and AI-ready interfaces determine how quickly teams can launch, adapt, and scale. Early…

Read More
filmmaking
Lights, Camera, Authenticity: Why Trusting Your Voice Is the Most Radical Move in Filmmaking Today
February 3, 2026

The entertainment industry is at a crossroads, where questions of access, authorship, and technological disruption are reshaping who gets to tell stories—and how those stories get made. From the rise of AI-assisted tools to ongoing conversations about representation and gatekeeping, filmmaking today is as much about identity and equity as it is about craft….

Read More
AI in energy
May the Agentforce Be With You: AI in Energy Services
February 3, 2026

Generative AI has moved past being a shiny demo and into the messy reality of enterprise operations—where data lives in different systems, customers expect instant answers, and security teams (rightfully) say “prove it.” In energy services specifically, even small efficiency gains matter: many retail energy providers operate on thin margins, and operational blind spots—billing…

Read More
Energy billing
Nightmare on Revenue Street: Energy Billing Edition
February 3, 2026

Energy billing is one of those things most people only think about when something goes wrong—an unusually high charge, a missing bill, a surprise shutoff notice, or a rate plan that suddenly doesn’t make sense. With smart meters, more complex pricing options, and different rules in regulated vs. deregulated markets, even a small breakdown…

Read More