{"id":16033,"date":"2026-03-02T12:46:03","date_gmt":"2026-03-01T23:46:03","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=16033"},"modified":"2026-03-02T12:46:03","modified_gmt":"2026-03-01T23:46:03","slug":"your-phone-is-a-target","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=16033","title":{"rendered":"Your Phone Is a Target"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Why Mobile Security Can&#8217;t Be an Afterthought<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Think about everything on your smartphone or tablet right now: your email, your banking app, Microsoft 365, client communications, multifactor authentication codes, and a direct line into your company&#8217;s cloud systems.<\/p>\n<h3 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Now ask yourself \u2014 how seriously are you protecting it?<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">For most New Zealand businesses, mobile devices remain one of the biggest blind spots in their cybersecurity strategy. Yet the evidence is clear: attackers know this, and they&#8217;re exploiting it.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">The Scale of the Problem Is Growing Fast<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Mobile threats are surging at an alarming rate. <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/kaspersky-report-attacks-on-smartphones-increased-in-the-first-half-of-2025\">According to Kaspersky<\/a>, there were 29% more attacks on Android smartphone users in the first half of 2025 compared to the same period in 2024 , and 48% more compared to the second half of 2024. Meanwhile, L<a href=\"https:\/\/www.lookout.com\/threat-intelligence\/report\/2024-annual-mobile-threat-report\">ookout&#8217;s 2024 Annual Mobile Threat Report<\/a> found that threat actors, from nation-states to individual criminals, are increasingly targeting mobile devices as their first point of attack \u2014 using them as a gateway to infiltrate corporate cloud systems.\u00a0<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">And it&#8217;s not just Android users who need to worry. In 2024,<a href=\"https:\/\/www.helpnetsecurity.com\/2025\/04\/11\/mobile-cybersecurity-challenges\/\"> 26% of iOS devices<\/a> were targeted by phishing attacks, compared to 12% of Android devices,\u00a0meaning Apple&#8217;s walled garden offers less protection than many people assume when it comes to social engineering and credential theft.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Closer to home, <a href=\"https:\/\/www.nzherald.co.nz\/business\/cyber-attacks-cost-kiwis-an-estimated-16-billion-in-2024\/2VFBZAPEANC5ZBJXB4GKJVVDHI\/\">New Zealanders lost<\/a> an estimated $1.6 billion to online threats in 2024, with 54% of adult New Zealanders having experienced an online threat in the last six months of the year. Phone calls accounted for 46% of threat delivery, and text messages 35%. <span class=\"inline-flex\" data-state=\"closed\"><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(34,34,34,0.1)&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2>No Operating System Is Immune<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">A common misconception is that iPhones are inherently safe and that threats primarily target Android. The reality is more nuanced. In early 2024, <a href=\"https:\/\/securelist.com\/mobile-threat-report-2024\/115494\/\">researchers discovered<\/a> &#8220;SparkCat&#8221; malware embedded in apps on both Google Play and Apple&#8217;s App Store \u2014 marking the first known OCR malware to infiltrate Apple&#8217;s official marketplace. Both stores removed the infected apps in February 2025, but telemetry data showed the malware continued spreading through unofficial sources.<span class=\"inline-flex\" data-state=\"closed\"><\/span><\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">On the Android side, the number of mobile banking trojans detected in the first half of 2025 was <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/kaspersky-report-attacks-on-smartphones-increased-in-the-first-half-of-2025\">nearly four times higher<\/a> than in the first half of 2024, <span class=\"inline-flex\" data-state=\"closed\"><\/span>with criminals disguising malware as legitimate apps including calculators, banking tools, and reward programs.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&quot;2_5&quot; _builder_version=&quot;4.27.5&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot;][et_pb_image src=&quot;https:\/\/new.kinetics.co.nz\/wp-content\/uploads\/2026\/03\/CyberPhone400.png&quot; title_text=&quot;CyberPhone400&quot; _builder_version=&quot;4.27.5&quot; _module_preset=&quot;default&quot; border_radii=&quot;on|20px|20px|20px|20px&quot; box_shadow_style=&quot;preset1&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&quot;4.27.5&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot;][et_pb_column type=&quot;4_4&quot; _builder_version=&quot;4.27.5&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot;][et_pb_text _builder_version=&quot;4.27.5&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot; min_height=&quot;168px&quot; custom_padding=&quot;2px|||||&quot;]<\/p>\n<h2><span style=\"font-size: 26px;\">Outdated Devices Are Open Doors<\/span><\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">One of the simplest and most overlooked risks is simply failing to keep devices updated. <a href=\"https:\/\/www.certosoftware.com\/insights\/phone-hacking-and-mobile-security-stats\/\">In Q4 2024<\/a>, 17.23% of Android devices were running an operating system version no longer receiving security updates, and 44% of iPhones do not have automatic updates enabled. \u00a0<strong>Every unpatched device is an open invitation.<\/strong><\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">According to <a href=\"https:\/\/www.vervali.com\/blog\/mobile-app-security-testing-in-2026-statistics-owasp-threats-and-what-it-costs-to-get-it-wrong\/\">Verizon&#8217;s 2025 Mobile Security Index<\/a>, 63% of organisations suffered significant repercussions from mobile-related downtime \u2014 up from 47% in 2024. <span class=\"inline-flex\" data-state=\"closed\"><\/span>\u00a0That&#8217;s not a peripheral problem; it&#8217;s a mainstream business risk.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; min_height=&#8221;511px&#8221; custom_padding=&#8221;1px|||||&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">What Good Mobile Security Looks Like<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Protecting mobile devices isn&#8217;t just about installing an antivirus app. A strategic approach includes:<\/p>\n<ul class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3\">\n<li class=\"whitespace-normal break-words pl-2\"><strong>Mobile Device Management (MDM):<\/strong> Enforcing security policies across all company and employee-owned devices<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>Endpoint Detection and Response (EDR):<\/strong> Detecting threats at the device level before they escalate<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>MFA app-based authentication:<\/strong> Moving away from SMS-based codes, which are increasingly intercepted<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>Regular patching policies:<\/strong> Ensuring operating systems and apps are updated consistently<\/li>\n<li class=\"whitespace-normal break-words pl-2\"><strong>User awareness training:<\/strong> Teaching staff to recognise smishing, vishing, and social engineering attempts<\/li>\n<\/ul>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">At Kinetics, mobile security is integrated into our KARE Foundation service \u2014 not bolted on as an afterthought. We help businesses build a consistent, policy-driven approach to mobile protection that covers both company-managed and bring-your-own-device (BYOD) environments. They just have to be included in your KARE cyber-security contract.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Your mobile devices are endpoints just like any server or workstation. It&#8217;s time to treat them that way.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why Mobile Security Can&#8217;t Be an Afterthought Think about everything on your smartphone or tablet right now: your email, your banking app, Microsoft 365, client communications, multifactor authentication codes, and a direct line into your company&#8217;s cloud systems. Now ask yourself \u2014 how seriously are you protecting it? For most New Zealand businesses, mobile devices [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":16034,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-16033","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/16033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16033"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/16033\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}