<img alt="" src="https://secure.ruth8badb.com/159331.png" style="display:none;">
Cimpl Blog

Cimpl Blog

Your Weekly Insights on How to Manage your Enterprise Digital Footprint.

My Online Account Was Hacked

Posted by Caroline Le Brun | January 16, 2014 8:39 AM

BYOD users are huge targets for hackers

A few weeks ago, I received an email from my cell phone provider telling me that I had an overdue bill. It further said that I could directly pay the amount due by clicking on a provided link to access a secure page. Unfortunately for Mr. or Mrs. Hacker, I always pay my bills with my online bank account; most of all, I was sure that I had paid the previous month’s bill on time.

TEM Security

But not everyone is as paranoid and punctual as I am. And most people don't share my awareness of phishing tactics. It's easy to see how many people can fall for hacking attempts when you see the effort that con artists put into to impersonating your cell phone provider, your bank, or your boss when they write supposedly authentic emails. The mobility and BYOD environment increase the need to fight such hacking tactics at home and at work. The company Marble Security conducted a survey focused on the millenial generation (adults born between 1980 and 2000), asking them:  "have you ever had an online account hacked?" The results highlight the urgency with which CIOs must educate employees about online threats and hacking risks for companies. According to the survey, adults:

  • In the 25-34 age group: 26% had an online account hacked

  • In the 35-44 age group: 24% had an online account hacked

Awareness training is the best prevention

Hacking has thrived since the Internet was invented and it will continue to become more sophisticated to match technological advances. That’s why education and awareness are the best remedy. Everyone is at risk, even technophiles - hacking sophistication is simply increasing that quickly. We are all equally at risk!

Social engineering techniques (as such forms of hacking are know) like phishing or watering hole attacks are the main threats which target BYOD employees. For CIOs, their main purpose is to protect sensitive corporate data and to ensure that employees are aware and careful when they use their own mobile devices. Personal accounts, passwords, and profiles owned by the employees are delicate pieces of information that hackers can easily take and use to compromise a company.

The use of security software is recommended but it is important to note that hackers are also trained to circumvent the security features of such software. That’s why awareness training is a fundamental part of protecting against attacks. And what better way to see danger coming than to know how to spot it?

Security matters. That is why Cimpl was made to help you to clarify how your devices are used, when, and by whom. Cimpl software enforces IT governance through customized alerts to give you control of your telecom and IT assets through telecom expense management. Now, track all your assets, services, and expenses with an all-in-one solution made simple.

For more information, visit our website or click below!


Bring Your Own Device BYOD



Topics: Bring Your Own Device (BYOD), Security, IT Assets

Written by Caroline Le Brun

Having worked in marketing for 16 years, Caroline has significantly improved Cimpl’s online presence and industry recognition as Marketing Director. Working closely with analysts and highly focused on keeping up with IT industry trends, she is most knowledgeable in the realm of technology and IT expense management best practices. As a passionate, driven marketer, she works side by side with her marketing team to bring Cimpl beyond its greatest achievements.

Subscribe to our Blog

Follow Us!

2019 Product Roadmap Webinar
What is WEM? ePaper
What is UCCEM?