Your Mobile is Not Just a Phone — It's a Handheld Mini-Computer Subject to Attack
Privacy, Cyber & AI Decoded Alert | 2 min read
Oct 11, 2018
Risk Management Question: We need to stop treating our mobile phones like they're just phones. They are mini-computers more powerful than the computers that guided the Apollo 11 spacecraft to the moon and back. What common sense steps can lawyers take to protect sensitive and confidential personal and client information accessible on, and sent from, mobile phones, and meet the ethical duty to safeguard client information?
The Issue: Our mobile phones have become an extension of us—they provide ready access to information about where we are supposed to be and when (including directions), and offer 24/7 contact with friends, family and work. Their size, portability, functionality and ubiquitous availability have resulted in our underestimating how vulnerable they are to hacking and social engineering exploits. To protect our own personal information and confidential client information, we need to adjust our mindset and treat our phones like the computers that they are.
Risk Management Solution: A recent infographic from KnowBe4.com—"20 Ways to Block Mobile Attacks"—outlines, as the title suggests, steps that can protect mobile phones from hacking and fraudulent schemes. It is well worth reading and is accessible at: https://www.knowbe4.com/hubfs/20WaysToStopMobileAttacks.pdf.
Some of the suggestions will be familiar to desktop and laptop users:
- Think before clicking on unsolicited text messages and emails.
- Do not send sensitive information over public WiFi without confirmation that it is a secure network.
- Giveaways or contests that sound too good to be true probably are, and may lead to phishing sites that appear legitimate.
- Resist any attempt to get you to reveal personal or sensitive information—either by telephone, email, text or other social media platforms. Confirm the sender's identity by contacting a verifiable telephone number (such as the bank's contact number on the credit card).
- Only provide sensitive information to live people and only when you have initiated the call.
Other measures may be less familiar:
- Disable mobile devices' ability to auto-join unfamiliar WiFi networks or Bluetooth pairings.
- Always turn off WiFi and Bluetooth when not in use.
- Install commonly-available software that identifies secure or risky websites.
- Only use apps available from official app stores—never an app download from a browser and be wary of apps from unknown developers. Keep apps updated. When apps are no longer supported by the app store, delete them.
The bottom line is that lawyers should be more conscientious in protecting sensitive information on mobile phones in order to ensure compliance with ethical duties to clients.
Even if you're just using your phone, remember to be careful out there.
Related People
Related Capabilities
Featured Insights

Webinar
May 19, 2026
Scott Seaman Speaks on Making Decisions in Difficult Risk Environments

Event
May 7, 2026 - May 9, 2026
Anshuman Vaidya Presents on IRS Criminal Tax Enforcement Priorities at the ABA Tax Meeting

Webinar
Apr 29, 2026
When a Cyber Breach Hits: Cybersecurity, Privacy, and Compliance

In The News
Apr 24, 2026
Michael Dowell Reviews New PBM Reform Reshaping Pharmacy Reimbursement

Lawyers for the Profession® Alert
Apr 21, 2026
When Does a Client’s Duty to Investigate Begin? Lessons from a Time-Barred Malpractice Case

Press Release
Apr 20, 2026
Tom Kuzmanovic Selected for BizTimes Milwaukee 2026 Notable Leaders in Law

Press Release
Apr 17, 2026
André Sesler Elected to the Board of Trustees of the University of Florida Law Center Association

Hinshaw Alert
Apr 17, 2026
Q&A: How to Submit Your IEEPA Refund Claim as CAPE Portal Launches April 20, 2026





