In the last few years, the use of smartphones has experienced spectacular growth (+394%) or, in other words, according to the latest study “Demand and use of Telecommunications Services and Information Societies”, drawn up by ONTSI, 7 out of 10 people aged 15 or older  (+74%) have a smartphone.

While the first smartphone users saw it as way to go one step beyond traditional calls and be able to access instant messaging applications, email or social networks on their mobile phone, nowadays the possibilities are endless and the smartphone has become an indispensable tool in our day to day as shown by the following statistics (extracted from the above report):


Of the total of Internet users that access the network daily, do so using their mobile phones


Of Internet users who have accessed online banking in the last three months have done so from a smartphone.


Of all online purchases (made in the last three months) came from smartphone users.

Data that, far from going unnoticed by hackers, have done nothing but increase their attention and focus on these devices. Without becoming paranoid, it scares a bit to think that we have turned the smartphone into a device that not only has information about where we are and what we do all the time, but also has access to our bank accounts and passwords, without forgetting the small detail of the camera and microphone that it incorporates. All accesible or available simply by unlocking a code or PIN and it is not even necessary in all cases (18% of smartphones users do not have an unlock code).

As a result of this, many people simply by clicking on a link in a social network or opening a page from a mail message get not only their personal devices but also the corporate ones compromised.  This is one of the  main problems that companies cuurently face, as more and more their employees access confidential information without any type of control or protection measure on the mobile device they use.

To avoid possible attacks to which we are exposed it is very important to create habits such as periodically changing our passwords, using different passwords for each account, avoiding links sent by mail or posted on social networks but above all,  it is essential to always be one step ahead of the possible threats and know and understand the effect and consequences an attack could have on our smartphone.

Follow us on Twitter and LinkedIn to stay up on the latest updates and remember that you can also subscribe to our blog!.