top of page
  • Writer's pictureThomas Jreige

Mobile Devices - Navigating the Real Cybersecurity Challenge: Beyond Simplistic Solutions

Updated: Jul 4

In an increasingly interconnected world, the issue of cybersecurity has become a pressing concern for individuals and organisations alike. With the rise of hacking incidents and data breaches, it is crucial to address the problem with seriousness and nuance. Unfortunately, recent advice suggesting that turning off our Mobile Devices (such as phones, tablets and the like) is a panacea against hackers oversimplifies the complex nature of cybersecurity. At some point you are always going to have to turn your phone back on and the same applications, same systems, and same configuration you switched off, will be there for the taking. Not to mention, the downtime for your business, with turning phones off. There has been no commercial thought about this from the Australia Government, or anyone advising them on this matter. It is time to delve deeper into the real challenges we face and equip ourselves with effective strategies to protect our digital lives.

Person using a mobile device


Understanding the Real Cybersecurity Problem

The landscape of cyber threats is evolving at an alarming pace. Hackers are becoming more sophisticated, employing advanced techniques to exploit vulnerabilities in our digital infrastructure. From phishing attacks to malware distribution, their methods are diverse and constantly evolving. Furthermore, the increasing reliance on interconnected devices and the Internet of Things (IoT) presents new opportunities for cybercriminals to infiltrate our lives.

Cybersecurity is not a challenge that can be resolved by a single, simplistic solution. While turning off our phones may temporarily reduce the risk of immediate attacks, it fails to address the root causes of cyber threats or equip individuals with the necessary knowledge and tools to protect themselves effectively. Instead, we must adopt a holistic approach to cybersecurity that encompasses various aspects of our digital lives.


Empowering Individuals with Effective Strategies

There are more effective strategies than just switching off your phone. These are more practical and more reasonable, considering some people run their very livelihoods called jobs off the phone:

  • Education and Awareness: Knowledge is power. We must prioritise educating individuals about the different types of cyber threats and how to identify them. This includes understanding phishing attempts, recognising suspicious emails or messages, and learning about common attack vectors. By arming individuals with this knowledge, we can reduce the likelihood of falling victim to cybercrime.

  • Strong Passwords and Authentication: Password hygiene remains a crucial aspect of cybersecurity. Encouraging individuals to use strong, unique passwords and enable two-factor authentication can significantly enhance their protection against unauthorised access. Regularly updating passwords and refraining from using easily guessable information can act as a strong deterrent against hackers.

  • Software Updates: Keeping our devices and software up to date is essential. Manufacturers release regular updates to patch security vulnerabilities and address emerging threats. Neglecting these updates leaves our devices exposed to known vulnerabilities, making them easy targets for hackers. Enabling automatic updates or regularly checking for updates ensures that we have the latest security patches installed.

  • Responsible Online Behaviour: Practicing caution while browsing the internet and engaging with online content is paramount. Users should be wary of clicking on suspicious links, downloading files from untrusted sources, or sharing personal information on unsecured websites. Employing reputable antivirus and anti-malware software further enhances our protection against potential threats.

  • Data Encryption and Backups: Encryption adds an extra layer of security to our sensitive data. By encrypting our devices and utilising secure communication channels, we can safeguard our information from unauthorised access. Additionally, regularly backing up important files and data ensures that we can recover them in the event of a security breach or hardware failure.

  • Secure Network Connections: Public Wi-Fi networks can be breeding grounds for hackers. Connecting to unsecured networks puts our personal information at risk. Utilising virtual private networks (VPNs) can help encrypt our internet traffic and maintain our privacy even on public networks. It is also advisable to be cautious when sharing personal information over Wi-Fi networks.

These strategies are only a small handful of suggestions for individuals and organisations as a whole. However, depending on your organisation’s and your personal risk appetite, you may require other measures to protect your system.


The complexities of the cybersecurity landscape demand a multifaceted approach that goes beyond simplistic advice. While turning off our phones may provide temporary respite, it fails to address the underlying issues and empower individuals with the knowledge and tools they need to protect themselves effectively.


By understanding the real challenges, we face in cyberspace and adopting comprehensive cybersecurity strategies, we can better defend against ever-evolving threats. Education, strong passwords, software updates, responsible online behaviour, encryption are among those mitigation strategies but these strategies only play a small part of the bigger picture.

bottom of page