Family Security Today Family Security Today
  • Protect My Family
  • Expert Corner
  • Knowledge Center
  • Contact Us

This is Why Hackers Love Your Kid’s Hand-Me-Down Phone

Here’s some unfortunate irony: Around two-thirds of parents say they gave their child a smartphone so it would be easier for their child to reach them if needed. Yet, 40% of all mobile devices are prone to cyberattacks.

Parents motivated by security are often thinking in a physical sense, not a virtual one. After all, it’s how most of us prioritize our child’s well-being. But the world is changing. Today’s bad guys are less likely to come through cracked windows than hacked Windows.

If your child has – or soon will have – a smartphone, read on. There are things you can do to make it – and the other devices on your network – less of a siren call to attackers.

“But Who Would Hack Us?”

It’s common for families to consider themselves an undesirable target for cybercriminals. But, here’s the reality: The dark web marketplace offers downloadable “kits” that make attacks on individuals and homes not only affordable but very scalable. In other words, it’s easier for criminals to steal smaller amounts of data from a bunch of people than go for bigger amounts in an enterprise attack. Home networks are far less secure than corporate ones, so it’s easy to see the appeal of running concurrent small-scale attacks.  

Novice and experienced data thieves alike use inexpensive hacking tool kits to cast wide nets that snare big caches of personally identifiable information, or PII. The crooks either sell that PII to other bad actors or use it themselves to pull off lucrative identity crimes.

The PII of children is an especially juicy catch because it typically accompanies unspoiled credit histories, which enable identity thieves to take out loans that never get repaid. (Try applying for student loans years later with a wrecked credit history. It’s not pretty.)

Outdated Phones are Unlocked Doors

When connected to vulnerable home networks, smartphones are a pathway to all other PII-rich devices on the network – computers, tablets, smart appliances, virtual assistants, security cameras and intelligent doorbells. Just think of what’s on your home laptop alone – last year’s tax return, digital photos of your kids, the emails and physical addresses of everyone you know, a cache of stored passwords, maybe even a few sensitive work files.

When ransomware finds its way from a child’s smartphone to its home network, each of the above PII elements (and so much more) can be at risk of not only malicious encryption, but also theft and resale. Recovering that data, not to mention repairing the damage from illegal use of it, is a painful process that demands major financial and emotional fortitude.   

4 Simple Steps for Stronger Security

Fortunately, there are four easy, inexpensive things parents can do to mitigate the risk of ransomware attacks originating on a smartphone.

Know the Phone. Smartphone security depends mainly on the software running within the device. This leaves families with older phones, especially hand-me-down devices that become “out of sight out of mind,” at greater risk. Even if you configure settings for automatic updates, they may not happen after a certain amount of time. There are significant differences between how long Apple devices and Android devices (like Samsung, Google, and Motorola) continue to patch security vulnerabilities on older smartphones. Apple for instance generally supports its smartphones for five years or more, at least from a security patch management perspective. On the other hand, most Android phone users, including those who purchase more expensive ‘flagship’ models from manufacturers like Samsung, should expect between two to three years of ongoing vulnerability and patch management- four years maximum for security patch management.

Talk with Kids. (And not just once.) Just as you would have regular check-ins on other important topics, adjusting the content as they get older, it’s smart to share frequent reminders about good online behavior. Sure, they might get sick of hearing “Don’t click strange links,” but they’re probably just as tired of hearing “Brush your teeth,” and you’re not going to stop saying that, right? Keep yourself educated by visiting sites like FamilySecurityToday.com so you can advise them of new tricks and traps to avoid.

Backup your Backup. Cloud storage is great, but it’s not the only answer to protecting your data from theft or encryption for ransom. A best practice is to use two cloud providers. As a cherry on top, consider adding external storage, such as a 2TB portable hard drive, to your backup process. Keep the selfies and Snaps in the cloud and your most critical files in the cloud and on your physical drive.

Watch at Work. If you or another adult in your household is lucky enough to have an employer that provides data security and privacy training, take advantage. The security tips company IT departments share with employees have just as much application at home as they do at work. If they don’t apply today, they will very soon. As corporate info security teams learn how to prevent different cyber attacks, the crooks don’t just give up; they simply change their aim.

By day, father Eduard Goodman is chief privacy officer for intelligent identity security firm Sontiq, a TransUnion company. By night, he is head of the Goodman family IT department.

Eduard Goodman
JD, LLM | Chief Privacy Officer
BIO

Eduard Goodman is an internationally trained privacy attorney, recognized global data protection expert, and Chief Privacy Officer for Sontiq. As a graduate of both US and Dutch law schools, he has studied, written, and lectured extensively around the world on emerging cyber trends and their impacts on fraud, privacy, and risk management.

Knowledge Center
Exclusive offer! Don't wait to sign up!
GET 33% OFF TOP-RATED IDENTITY THEFT PRODUCTION PLANS FOR FAMILIES.
Claim Offer

What You Need to Know:

The credit scores provided are based on the VantageScore® 3.0 model. Lenders use a variety of credit scores and are likely to use a credit score different from VantageScore® 3.0 to assess your creditworthiness.

FAQ Contact Us

What You Need to Know:

The credit scores provided are based on the VantageScore® 3.0 model. Lenders use a variety of credit scores and are likely to use a credit score different from VantageScore® 3.0 to assess your creditworthiness.

Family Security
  • Facebook
  • Twitter
  • LinkedIn
  • Youtube
  • Protect My Family
  • Expert Corner
  • Knowledge Center
  • About Us
  • Contact Us
  • Trust Center
  • Terms of Use
  • Privacy Notice
  • Do Not Sell My Personal Information

© 2023 Sontiq. All rights reserved.