Mobile Devices & Technology

Did you know?
48% of phishing attacks take place on mobile, and users are 3x more vulnerable to phishing on mobile than on desktop.2

With more than 50% of all Internet traffic coming from mobile devices, it’s no surprise that attackers have turned their attention to mobile employees, apps, and mobile devices as the next frontier of fraud.1 Corporate devices hold a vast array of data for attackers to target. While many apps authenticate with single sign-on services, many employees have their own user credentials. 

Related Resources

For more, access the Protection Resource Center at www.cunamutual.com/prc

Password/ID Required

  • Member Authentication
  • Consumer Risk
  • Ransomware & Cyber Risks
  • Employee Safety
  • Employer Risks, Rights & Obligations
  • Compliance Overload
  • Cards and Payment Trends
  • Branch Operations
  • Spam Shams and Other Scams
  • Mobile Devices & Technology
  • Lending Oversight

1StatCounter, 2019
2Wandera, 2019
This resource is for informational purposes only. It does not constitute legal advice. Please consult your legal advisors regarding this or any other legal issues relating to your credit union. Any examples provided have been simplified to give you an overview of the importance of selecting appropriate coverage limits, insuring-to-value, and implementing loss prevention techniques. CUNA Mutual Group is the marketing name for CUNA Mutual Holding Company, a mutual insurance holding company, its subsidiaries and affiliates. Insurance products offered to financial institutions and their affiliates are underwritten by CUMIS Insurance Society, Inc. or CUMIS Specialty Insurance Company, members of the CUNA Mutual Group.