Serious hacking programs - called "persistent threats" - and sophisticated phishing and phishing technologies are making headlines when it comes to cybersecurity.

Author Zack Duffman said in his report published by Forbes magazine that cyber attacks targeting organizations around the world are often caused by an employee who inadvertently clicks or downloads these malicious programs.

Threats are increasingly targeting smartphones rather than computers, through social media messages and accounts rather than e-mail.

Therefore, employees should be aware that their applications and online activity on their smartphones can pose a significant risk to the employer's business.

The writer reported that Wendira's information protection team conducted research to ascertain the risks and threats posed by these devices to organizations.

The research found that enterprise mobile management platforms failed to address 33% of phishing attacks, 19% of intermediary attacks, and 16% of password theft attacks in 2019.

The search included all smartphones running Android and iOS, applications downloaded from official stores, as well as virtual private networks and antivirus software.

The company reported that official app stores could inadvertently deploy apps that compromise the company's data.

Official app stores can unintentionally publish apps that compromise your company's data (Getty Images)

The team realized that there were apps in Google and Apple that contained malware and leaked credentials and passwords to cloud storage accounts.

According to an industry report, 87% of executives said untrained employees were the biggest cyber risk to their projects.

The report categorized internal threats - 87% - ahead of malware and spyware, which accounted for 81%, phishing, 64%, hackers (59%) and cybercriminals (57%).

In fact, 44% of cyber attacks occur over a secure encrypted HTTP connection, and hackers can easily obtain SSL certificates to make their malicious sites more reliable.

The writer added that this research submitted by the company is elaborate, but the facts are darker. Although the devices we carry everywhere now enjoy more sophisticated protection than ever before, they are becoming more complex.

This complexity provides a platform for actors to exploit them, and we now see the threats hidden behind the images and the transition from email to messaging and social engineering applications.