ChannelLife New Zealand logo
Industry insider news for New Zealand's technology resellers
Story image

Mobile madness: Unpacking the business and personal risks of digital mobile in Aotearoa

By Mitchell Hageman
Thu 27 Jan 2022

iPhone, Android, Blackberry. If you are a working professional in the business world, you would undoubtedly have come across these things. 

Perhaps you've been given one as a work phone for your company, or have decided to buy one for your personal use. Either way, it's become abundantly clear that our lives have become dependent on this type of technology, in both a business and personal sense.

With cell phones being used for dual purposes, inherent risks are also involved. The mix of sensitive data and personal information and activity is dangerous, particularly if people aren't careful about what they do online.

This begs the question of how safe we really are on our phones. Should Kiwis practice better smartphone security, and are they one swipe or tap away from a colossal data breach?

Famously, many prominent smartphone apps and programs have been systematically hacked by exploiting their key features. In the professional world, a notable example of this was the infamous Uber app hack in 2016, which resulted in 57 million users having their information across all mobile devices.

The risk is real, and with the increased undertaking of hybrid and remote work, hackers have an even bigger opportunity to steal data from a range of new networking and content making apps installed on smartphones. To add to this, there is the heightened risk of a breach through means such as IP addresses, fake apps and cookies through Safari or Google.

A damning statistic in Proofpoint's 2020 State Of The Phise Report revealed that before the pandemic, 90% of respondents globally said they used employer-issued devices for personal activities. In addition, 32% of working adults were unfamiliar with Virtual Private Network (VPN) services. The findings also revealed a significant knowledge gap, where only 61% of these adults correctly identified examples of phishing and understood the term. Both of these subjects are some of the most common security threat related terms for device users.

In the subsequent 2021 report, more than 50% of respondents indicated they used a hybrid work scenario, and through this, there were further indications that work phones are still being widely used for a variety of personal reasons, including gaming and online shopping. The most common use of work devices was to check a personal email, which can be attributed to various cyber risks.

McAfee consumer marketing director Natalie Maxfield states on the McAfee company blog that, "A smartphone loaded with business and personal data makes for a desirable target. Hackers target smartphones because they're often unprotected, which gives hackers an easy "in" to your personal information and to any corporate networks you may use. It's like two hacks with one stone."

With this statement in mind, it's clear both businesses and consumers need to be aware and proactive in these times of rapid change. New Zealand Telecommunications Forum's (TCF) CEO Paul Brislen believes while the problem is less of an issue directly here in NZ, employers and employees are starting to become more aware of the dangers involved and then acting accordingly.

"I think the more people rely on these devices, and the more we use them for everything from banking to COVID, the more at risk they are. I think people are becoming much more careful."

He elaborates that hybrid work has forced employees to have more self-responsibility for their own cell phone security as they will generally not have access to the full range of systems in place they would usually have in a workplace or office.

"A lot of companies have now said, 'you guys are now responsible for your own IP security in a way that you never were before.' 

"If sitting in an office, it was generally absolutely fine to rely on the firewall and the IT department. When you're at home, it's all on you. You've got to be aware of phishing attacks and scam calls and all that kind of thing," he says.

The TCF also consistently works alongside key government agencies on behalf of the telco industry to maximise security and limit fraud in any way they can.

"We work on behalf of the industry with the likes of CIT, the Cybersecurity Emergency Response Team and the GCSB."

When asked to give advice for employers who provide staff with work phones and plans, Brislen says it would be wise for them to think carefully about the demands of the business and the degree of risk associated with each role.

"I really like the idea of employers and employees sitting down and working out what digital technology is right for that employee in that role," he says.

"I had lunch with an old colleague, and he's got a work phone and a personal phone and never the two shall meet. He keeps them very separate because he's in a high security role."

Brislen says at the end of the day, communication is the key to better solutions.

"It's really about having that conversation, making sure that you're maximising everybody's best efforts."

Telecom provider Spark NZ is also involved in ensuring its clients' networks for cell phones are secure and reliable.

Spark cyber defence chapter lead Nyuk Loong Kiw says that many factors to do with individual work systems are beyond the Sparks control, but the company suggests some useful safety measures to follow and have implemented a number of controls for general security.

"Risk management is a core part of running all businesses. Cyber security risk associated with cell phones is only one aspect of the possible attack vector. Spark's recommendation to businesses is to have a defined cyber security strategy and plan, understand what could hurt their organisation due to a cyber security incident (e.g. ransomware, DDOS or a compromised account on a cell phone or laptop) and have plan to protect and detect those events accordingly," he says.

"Spark works closely with GCSB, as part of compliance to the Telecommunications (Interception Capability and Security) Act 2013 (TICSA), which establishes obligations for New Zealand's telecommunications network operators regarding network security. TICSA is designed to prevent, sufficiently mitigate or remove security risks from the design, build and operation of public telecommunications networks."

He says that risk is most prominent when the employer does not provide devices such as phones, and having clear communication channels will prevent information from getting lost in the process.

"If the devices are provided by employees, that creates risk. For example, an employee's device might be old, and they may have trouble updating it. Or it may contain apps that could put the organisation's information at risk if they're from an untrusted source or if the employee has given the apps wide-reaching permission to access information on their phone. However, if businesses provide the mobile device, they may find it easier to oversee things like updates, operating systems and to manage the overall business technology environment.

"It is also a good idea to have open lines of communication about how an employer expects a work-provided mobile phone to be used, whether and to what extent the employer will have access to the device and information held on it, or even what will happen to the device and data in certain scenarios, such as when the employee moves on."

Some of the other tips recommended by Spark for businesses and consumers include:

  • Be careful where you store and to whom you provide your personal details
  • Be guarded with what you make public on social media
  • Make sure you keep your software and anti-virus programmes up to date
  • Check the security and privacy controls of apps before you install them and avoid giving apps more permission than they legitimately need
  • Use a different password for all your online accounts
  • Change your passwords often and don't reuse old passwords
  • Use Multi-Factor Authentication (MFA) for online accounts where it's available
Public Interest Journalism Fund logo
Public Interest Journalism funded through NZ On Air.
Related stories
Top stories
Story image
Tech job moves
Tech job moves - Adatree, Brother, Databricks, Nutanix & Rubrik
We round up all job appointments from May 20-26, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Cybersecurity
Could New Zealanders initiate a cyber attack from within?
The threat landscape is significantly increasing worldwide, and the opportunities it presents are a growing concern in Aotearoa.
Story image
PIJF
The path to bolstering supply chain security in New Zealand
A significant amount of today's business and leisure activity relies on IT supply chains. From complex international freight trades to local small business distribution channels, any supply chain that involves IT infrastructure serves as a crucial tool in our daily lives. 
Story image
Ingram Micro
Ingram Micro NZ bolsters MSI product range with new offerings
The inclusion of MSI Mobile Workstation and Business & Productivity laptops rounds out the MSI product portfolio.
Story image
BYOD / Bring Your Own Device
How zero trust can lead the battle against ransomware
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.
Story image
Getac
Getac and Optalert expand partnership to promote industrial safety
Getac’s ZX70 Android tablets will be used to support Optalert’s Eagle Industrial early-warning drowsiness detection system for use in mining and transportation.
Story image
Manhattan Associates
Shortening the click-to-customer cycle through smart technologies
Speed of delivery without accuracy is a dealbreaker for consumers. How can retailers operating in an omnichannel environment overcome the challenge of click-to-customer cycle times.
Story image
Cybersecurity
Asia Pacific plagued by sophisticated bad bots - report
The three most common bot attacks were account takeover, content or price scraping, and scalping to obtain limited-availability items.
Story image
Identity and Access Management
The post-pandemic workforce requires secure IAM capabilities
HID Global discusses what identity and access management means for organisations in today's convoluted digital world.
Story image
Microsoft
Microsoft NZ and TupuToa to boost diversity in cybersecurity sector
Microsoft NZ has teamed up with TupuToa to co-develop a cyber security employment programme specifically aimed at creating more diversity in Aotearoa's cybersecurity sector.
Story image
Digital Marketing
Similarweb acquires SEO and rank tracking company Rank Ranger
Digital intelligence company Similarweb, which specialises in analysing web traffic, has acquired Rank Ranger, a market leader in SEO and rank tracking.
Story image
Digital Transformation
SAP partners with New Zealand Rugby for digital transformation
The multi-year partnership will see SAP advance NZR with its organisational operations, team performance, fan experience and sustainability goals.
Story image
Dynabook
Dynabook refreshes Portégé X30L series with the Portégé X30L-K
The new model contains hybrid-architecture Intel 12th Gen Core P-Series 28W processor options, Wi-Fi 6E, along with Intel Iris Xe graphics.
Story image
Wireless
Hands-on review: Technics EAH-A800 Noise Cancelling Wireless Headphones
Designed in Osaka, Japan, these headphones just exude quality. They aren’t heavy, but they feel well built and solid.
Story image
GapMaps
GapMaps Live to improve brand decisions on physical locations
GapMaps has released its latest service GapMaps Live, giving more insights and features to help brands make better decisions about physical locations.
Story image
Training
Delinea enhances partner experience with new training initiatives
Delinea has announced a range of training and certification initiatives to help scale the capacity of VARs, System Integrators, MSPs and MSSPs to meet the demand for PAM solutions.
Story image
Cybersecurity
Cybersecurity prompts upgrade for 1.3 billion electricity meters
ABI Research finds Advanced Metering Infrastructure (AMI) and cybersecurity concerns are prompting the upgrade of 1.3 billion electricity meters by 2027.
Story image
Sony
Sony launches LinkBuds S - the latest model in the series
Sony says the LinkBuds S will give users a unique sound experience through sensor and spatial sound technology, even in AR games.
Story image
Malware
'Alarming' rise in ransomware threats - Verizon report
As criminals look to leverage increasingly sophisticated forms of malware, it is ransomware that continues to prove particularly successful.
Story image
Cybersecurity
Comcast to use ThreatQuotient for cybersecurity operations
Comcast, the parent company of NBC Universal and SKY Group, has chosen ThreatQ Platform and ThreatQ Investigations to meet their cybersecurity needs.
Story image
Microsoft
Global cybersecurity insurance market worth $11.5b this year
Future Market Insights finds the cybersecurity insurance market is expected to reach USD$11.5 billion in 2022, growing to $61.2 billion in 10 years.
Story image
Microsoft
Microsoft previews Power Platform website design offering
Microsoft has announced the preview of Power Pages, the fifth product in its Power Platform family, designed for low-code makers and professional developers.
Story image
Silver Peak
The path to an adaptive, modern network
Managing and securing the network looks different than it did just two years ago—especially given that most of these networks are made up of multi-generations of infrastructure stitched together over time.
Story image
Malware
Fortinet introduces self-learning AI in latest offering
Fortinet is introducing self-learning AI capabilities in its new network detection and response offering, FortiNDR.
Story image
Cybercrime
The ups and downs and runarounds of catching cybercriminals in NZ
We're becoming more and more aware of cybercrimes but how many criminals actually get caught? The New Zealand police explain why the answer is complicated.
Story image
Data Protection
Information management capabilities to meet privacy requirements
Organisations with customers or operations across more than one country face a spate of new and proposed privacy and data protection laws.
Story image
Transport
Third-party automotive apps bear significant privacy risks
Mobile applications for connected cars provide various features to make life easier for motorists, but they can also be a source of risk.
Story image
Training
Infosec unveils role-guided cybersecurity training roadmaps
Infosec Skills Roles maps hands-on training and certifications to the 12 most in-demand cybersecurity roles to maximise training efficiency.
Story image
Red Sift
Entrust expands strategic partnership with Red Sift
Entrust has expanded its strategic partnership with Red Sift to make it easier for businesses to adopt Brand Indicators for Message Identification (BIMI) standards for email identification and security.
Story image
Hybrid Cloud
Barracuda expands cloud-native SASE platform
"The expansion of Barracuda's cloud-native SASE platform for hybrid deployment models and IIoT environments solves a number of challenges."
Story image
Cybersecurity
What every CISO must answer to enable a best-in-class security operations program
It has been widely reported recently that South Australian government employees have been the victims of a cyberattack.
Story image
Microsoft
Elevation of Privilege the top 2021 Microsoft vulnerability
BeyondTrust has released its 2022 Microsoft Vulnerabilities Report, finding that Elevation of Privilege is the top vulnerability category for the second consecutive year.
Story image
Digital Signage
MAXHUB's Digital Signage range to bolster boardroom productivity
The new MAXHUB Digital Signage technology is purpose-built to make every kind of team meeting more effective.
Story image
Omnichannel
Lexmark launches A/NZ first with retail publishing solution
Lexmark, a global imaging and IoT solutions leader, launched its Publishing Platform for Retail (PPR) in Australia and New Zealand.
Story image
Vectra AI
Vectra’s inaugural Partner of the Year Awards revealed
APAC companies Baidam, Firmus, ShellSoft and Macnica have been recognised in Vectra AI's inaugural Partner of the Year Awards.
Story image
Chorus
Chorus and Nokia launches first trial of 25G PON broadband
Chorus and Nokia have announced the successful demonstration of 25 gigabit per second fibre (Gbps) broadband technology at the Chorus Fibre Lab in Auckland. 
Story image
Phishing
WhatsApp and QR codes the next scam threat - report
KnowBe4 has warned it expects to see an increase in QR Codes and the WhatsApp chat platform being used for phishing and other scams. 
Story image
Wireless
Hands-on review: HyperX Pulsefire Haste wireless mouse and HyperX Pulsefire XL Mat
With its lightweight Pulsefire Haste wireless mouse and RGB lit Pulsefire XL Mat, HyperX sets out to up your game and add a little colour to your desktop.
Story image
Ransomware
Employees on the frontline of cyber defense - report
In the first quarter of 2022, employees found themselves more than ever at the frontline of cyber defense, according to a new report from Kroll. 
Story image
Microsoft
Microsoft NZ announces initiative for local SaaS businesses
Microsoft has announced a new initiative, bringing together all of its tools to help local SaaS businesses build, sell and grow their companies at scale.
Story image
Ransomware
CERT NZ releases first Cyber Security Insights for 2022
CERT NZ has released Quarter One: Cyber Security Insights 2022, which offers an overview of reports about cybersecurity incidents affecting New Zealanders.
Story image
Informatica
Informatica, Oracle enter strategic global cloud partnership
Oracle named Informatica as a preferred partner for enterprise cloud data integration and data governance for data warehouse and lakehouse solutions on OCI. 
Story image
Symbio
Symbio consolidates TNZI business to support APAC expansion
Symbio has recently announced the consolidation of its international business (TNZI) under the Symbio brand to support its Asia Pacific expansion strategy.
Story image
Surveillance
i-PRO releases smallest AI-based surveillance camera on the market
The new i-PRO mini network camera is now available, with a pocket-sized form factor and full AI analytics functionality.