Encrypted: The Personal Side to Cybersecurity

Hackers are gaining access to mobile devices regardless of users clicking on a link. This leads to the question: People are asking these days: are my devices safe, are the apps I’m downloading secure, and how can I protect myself and my data?

Christopher Novak, the Global Director for the Threat Research Advisory Center with Verizon, provided some thoughts and insights on these concerns and provided some tips and best practices on what people should be doing to keep their mobile devices secure.

“From a security standpoint, we are always looking for there to be a hack or attack kind of angle for just about everything,” Novak said. “So naturally, when these big outages occur (like the recent outage at Facebook), they attract a lot of attention.” And while the current information on hand points to an internal issue, and not a cyberattack that brought Facebook down on October 4th, it raises the concern of many people about the safety of their data.

And these security concerns weren’t helped by the recent Apple malware attack called CVE-2021-30860, which could operate undetected to the user and potentially grab personal data. And While not every cyberattack is something a device user can protect themselves against, Novak said some best practices could safeguard many security risks.

“A couple of things that immediately come to mind,” Novak noted. “Number one: avoid rooting your device.” Sometimes called ‘jailbreaking,’ a user breaks out of some of the manufacturer’s core settings to do different things with the device; however, this can cause security failures built into the device’s core settings.

“Another one I always recommend is multi-factor identification. This way, if someone does get access to some of your information, or they learn your password, that’s not enough for them to get into your accounts or your devices.”

View Verizon Business’ Resources for more helpful and engaging content.

Follow us on social media for the latest updates in B2B!

Image

Latest

spiral growth
Spiral Growth: The Career Strategy That Builds Real Leaders
February 11, 2026

Leadership pipelines are under pressure. Companies are moving faster, roles are becoming more cross-functional, and high-potential talent is expected to deliver beyond narrow job descriptions earlier in their careers. At the same time, the World Economic Forum estimates that 39% of workers’ core skills will need to evolve by 2030 to keep pace with…

Read More
ethical AI
In the Race to Build Smarter AI, Technology Leaders Shouldn’t Forget That Innovation Needs Oversight
February 11, 2026

When a résumé is filtered out, a loan is denied, or a piece of content never reaches its audience, artificial intelligence may be the unseen hand behind the outcome. As these systems spread across the tools and institutions that shape daily life, the assumptions and priorities of their designers are carried forward into decisions…

Read More
Resource Officers
Beyond Enforcement: The Evolving Role of School Resource Officers
February 10, 2026

School Safety Today podcast, presented by Raptor Technologies. In this episode of School Safety Today, host Dr. Amy Grosso sits down with Dr. Penny Schultz, Assistant Director of School Safety and Security at Chesapeake Public Schools, to unpack the often-misunderstood role of School Resource Officers (SROs). The conversation highlights how effective SROs function not…

Read More
transportation management
Transportation Management Systems Don’t Compete With Carriers, Brokers, or Shippers — They Align Them
February 10, 2026

Transportation management systems are undergoing a quiet but consequential shift. Once viewed primarily as tools for tracking loads and storing paperwork, modern TMS platforms are increasingly expected to function as the operational backbone of logistics organizations. As freight volumes continue to fluctuate, margins remain tight, and supply chains rely on a growing mix of…

Read More