Skip to content

GAVS – Global IT Consulting

Menu
  • Industries
    • Industries

      GAVS Technologies focuses on serving various industry verticals in their digital transformation through infrastructure solutions, adopting innovation and technologies in different domains. We offer services and solutions aligned with technology trends to enable enterprises to take advantage of futuristic technologies like DevOps, Smart Machines, Cloud, IoT, Predictive Analytics, Managed Infrastructure Services, and Security services.

      • Healthcare
      • Life Sciences
      • Banking & Financial Services
      • Manufacturing
      • Hi-Tech & Software
      • Telecom
    Close
  • Services
    • Services & Technologies

      GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation. GAVS’ AIOps platform, Zero Incident Framework ™ (ZIF), enables proactive detection and remediation of incidents and increases uptime, helping organizations drive towards a Zero Incident Enterprise™ . GAVS has transformed IT Enterprise delivery through ZIF’s Discover, Monitor, Analyze, Predict, and Remediate modules, to optimize business services continuity.

      • Digital Product Engineering
      • Application services & modernization
        • Application Development
        • Application Modernization
        • Application Management
        • Close
      • Cloud Enablement
        • Cloud Consulting
        • Cloud Operations
        • Cloud Native Engineering
        • Cloud Data
        • Cloud Transformation
        • Cloud Consulting and Advisory
        • Close
      • Data Strategy and Modernization
        • Data Privacy
        • Close
      • Cyber Security
        • Governance, risk and compliance
        • Data Privacy
        • Digital Identity Management
        • Infrastructure security
        • Close
      • User Experience Design
      • Enterprise Applications
        • Microsoft
        • Close
    • Services &Technologies
      • Reinforcement Learning- The Art of Teaching Machines

        Read more
    Close
  • Platforms & Products
    • Platforms & Products

      GAVS’ products will help change how you organize your IT Operations, bring meaningful and actionable insights to speed up network fixes, provide real data as quantifiable justification to adopt strategies that foster business improvements.

      • Products
        • ZIF
        • zIrrus
        • zDesk
        • Close
      • IP Accelerators
        • CloudGain
        • vKYC
        • ENWAT
        • IdentityDesk
        • Close
    • Reimagining your Digital Infrastructure with Zero Incident FrameworkTM

      Read more
    Close
  • Inside GAVS
    • Inside GAVS

      GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation. GAVS’ AIOps platform, Zero Incident Framework™ (ZIF), enables proactive detection and remediation of incidents and increases uptime, helping organizations drive towards a Zero Incident Enterprise™ . GAVS has transformed IT Enterprise delivery through ZIF’s Discover, Monitor, Analyze, Predict, and Remediate modules, to optimize business services continuity.

      • About Us
      • Client Speak
      • Alliances & Partnerships
      • Leadership Team
      • Social Responsibility
      • Events
      • Locations
      • Contact Us
      • Press Releases
      • Media Mentions
      • Awards and Recognitions
      • In Memoriam
      • Covid Care
    Close
  • Insights
    • Insights

      We bring you discerning insights on technology trends, innovation and organization culture, thru our collection of articles, blogs and more. Insights reflects our passion in driving advancements as we move forward creating new paradigms in business and work culture. You would find our thoughts on a variety of topics ranging from evolving technologies and ways it affects businesses and lives, transformational leadership, high impact teams, diversity, inclusion and much more.

      • Blogs
      • Articles
      • White Papers
      • Brochures
      • Videos
      • Case Studies
      • enGAge Magazine
    • insights
      • Seven Tips for Leading IT Modernization and Digital Transformation

        Read more

    Close
  • Work with Us
    • Work with us

      What it means to be a GAVSian?

      If you rate high on our SWAT test (Smart, Hardworking, Articulate, Technologically curious), GAVS’ hiring profile, we promise you excitement, inspiration and the freedom to succeed in our flat organization. Being a GAVSian, you would represent our cutting edge in technological advancement while we help you hone yourself into the person you aspire to be. That’s the level of personal interest we invest in you.

      • Career with GAVS
      • Company Culture
      • Diversity @ GAVS
      • Building a respectful workplace
    Close
    • Close
Back to blogs

Smart Phones – A Lucrative Target for Hackers

Mar 15, 2023
  • ai in operations management
  • ai led managed services
  • best cyber security services companies
  • cyber Security and Compliance services
  • digital transformation services and solutions
SHARE

In this blog post

  • Reference

From using phones with no internet access to having smartphones to unlock your smart cars, we have come a very long way. With little or no security defense and access to valuable organizational information, smart devices are becoming the new favorite target of attackers.

 

On the occasion of International Women’s Day 2023, three female cyber experts from the GS Lab|GAVS Security Team had come together to have a deep dive discussion on this topic.

 

“With the advancement and increased proliferation of technology, there has also been an increase in cyberattacks. Phone-based security attacks have been a common news item these days. Threat actors are constantly trying to steal data; with low security and having multiple attack vectors, smartphones are an easy target”, said Bhavani Damodaran, Technical Manager, Information Security.

 

From a Security Operations point of view, Mythili V, Sr. Engineer, commented that the number of Vishing/Smishing related attacks is on the rise. “We are experiencing a huge number of attacks targeting smartphone users where Vishing/Smishing is one of them.

 

Smishing is a type of phishing scam, where a hacker sends a SMS which seems legitimate with an urgency in the message. This creates panic among the users, so they react/respond to the message almost immediately.

 

Most of us would panic if we saw a message that goes like “We have detected suspicious activity on your bank account, hence we have blocked your account, to unblock please click on the below link” or “Priority!! Your account has been compromised. Please click this link to reset your password.” 

 

We would immediately act on the message by clicking the link present within assuming it is from a legit source. This is where the hacker wins by making us click a malicious link and thereby gaining access to our sensitive information.” 

 

The link might redirect us to another website, or it may download malware which enable the hackers to steal the personal information like DOB, Names, Contacts credit card and bank account information, location history, contact list, photos, and more for their benefits.

 

Most of the data collected through these attacks are sold in the dark web.

 

According to a latest report by Nord VPN, Stolen data of around 5 million internet users globally is being sold online of which 600,000 is that of Indians. Making India the most affected country.

 

Also, one more type of mobile based attack is Vishing – the scammers call the victim using pre-recorded voice message, pretending to be a legitimate source, and seeking personal information from the answers the victim gives.

 

Though many of us are aware of what is Phishing, user awareness on Smishing and Vishing needs to be increased. Making the user understand that they should keep calm while handling these calls and messages and be informed not to give any sensitive personal information. We should be careful while clicking on links from unknown sources.

 

Madhumitha K, Engineer, Access Management mentioned that “With very less or poorly managed access protection, the hackers could easily gain access to our mobile devices. Use of two-factor authentication like strong passwords/codes along with biometrics can ensure that even if our phone gets lost or stolen, we would be still able to protect our precious data within. 

 

Also downloads of malicious apps or accessing malicious websites could open entry ways for bad actors to get in. These days, with a click of a link malware gets downloaded in the background without the user’s knowledge. The user should be well informed and access only trusted sites or download apps from the App Store and provide only the required permission to these apps.” 

 

She also added that we could escape from these attacks by

  • using cellular data over public Wi-Fi,
  • enabling strong authentication for banking and company-related apps
  • Not accessing untrusted websites or clicking on pop-ups
  • avoiding accepting all cookies
  • updating OS & apps regularly

 

People are constantly downloading applications and software and often the most sought out ones are the free apps – these apps often are not secured and trustworthy. It gives way for the cyber criminals to find loopholes to exploit and enter the targets phone.

 

“Many organizations are having their business data accessed through mobile devices. The number of smart phones as an organization’s endpoint has increased in the recent days. Organizations are constantly seeking newer security measures to manage and monitor the mobile devices. 

 

Mobile device management (MDM) policies are being implemented to enforce stronger security controls such as DLP, encryption, password policies and remote wipe capabilities. Once the device is reported missing or hacked the organization has an option to wipe all the data from remote. 

 

Training users on security best practices also play a vital role in helping users stay safe” said Bhavani Damodaran, Technical Manager, Information Security

Reference

http://m.timesofindia.com/articleshow/96084441.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst

Author

Bhavani Damodaran

Bhavani has held numerous positions of responsibility in the areas of Information Security such as risk management, IT controls, audits and compliance. Her expertise involves in handling IT risks, security control framework designing and assessing digital tools. She is an avid traveller and passionate about driving.

Mythili V

Mythili has worked in field of System Administration and Security Management specialized in the field of Antivirus and is currently part of the internal security operations team.

Madhumitha K

Madhumitha is an Engineer with expertise in PAM and IDAM who believes in the concept of limited access for a limited time. She is also a content creator and passionate traveller.

Tags

  • ai in operations management
  • ai led managed services
  • best cyber security services companies
  • cyber Security and Compliance services
  • digital transformation services and solutions


ai in operations management
A Merger Journey
Read More
Digital Transformation Services and Solutions
Organizational Culture and the Importance of Effective Leadership
Read More
software product engineering companies
Application Engineering – An ART
Read More
GAVS – Global IT Consulting

Copyright © 2023, GAVS Technologies.

  • Privacy Policy
  • Cookie Policy
  • Terms of use
  • Contact Us
  • Platforms & Products
    • Platforms & Products
    • Products
      • Zero Incident Framework ™
      • Products
      • zDesk – Remote, Secure Desktop-as-a-Service (VDI+)
      • GTOps
      • TruOps
      • zIrrus
  • Services & Technologies
    • Services & Technologies
    • Digital Services
      • Digital Services
      • Auto Discovery and Dependency Mapping
      • Cloud Enablement
        • Cloud Advisory and Transformation
      • Automation
      • Blockchain
    • Data Privacy Services
    • Cyber Security Services
      • Cyber Security Services
      • Risk and Compliance
      • Security Automation
      • Managed Security Services (MSS)
      • Managed Detection and Response (MDR)
      • Identity and Access Management
      • Assessment and Advisory
    • Consulting & Implementation Services
      • Consulting & Implementation Services
      • Cloud Assessment & Advisory
      • Data Center Assessment
      • Data Center-as-a-Service (DCaaS)
      • Infrastructure re-engineering
      • Data Center Consolidation & Migration
    • Application Services
    • Enterprise Support Services
      • Enterprise Support Services
      • Managed Infrastructure Support
      • Remote Infrastructure Monitoring
      • End User Monitoring
    • Microsoft Services
  • Industries
    • Industries Overview
    • Healthcare
    • Banking & Financial Services
    • Manufacturing
    • Media & Publishing
  • Inside GAVS
    • Inside GAVS
    • About Us
    • Industries
    • Client Speak
    • Alliances & Partnerships
    • Leadership Team
    • Social Responsibility
    • Events
    • Find us
    • Reaching us
    • Press Releases
    • Media Mentions
    • Awards and recognitions
    • In Memoriam
    • Covid Care
  • Insights
    • Insights
    • Articles
    • Blogs
    • White Papers
    • Case Studies
    • Brochures
    • Videos
    • enGAge Magazine
  • Work with us
    • Work with us
    • Career with GAVS
    • Company Culture
    • Diversity @ GAVS
    • Building a respectful workplace

Schedule a Demo