Can you be hacked while using your mobile device? In a word, yes — here’s how to protect your data

Oct 19, 2022

4 min

Gokila Dorai, PhD


October is Cybersecurity Awareness Month and being aware of all your devices is as important as ever before. Most people are online every day, which opens themselves up to a threat of being hacked. Whether it be a mobile device, laptop, or personal computer, everyone needs to have cyber awareness.


Steven Weldon, director of the Cyber Institute at Augusta University’s School of Computer and Cyber Sciences said many straightforward things that can be done to protect devices, such as having lock screens, making sure operating systems are up to date and simply recognizing how, when and where devices are being used.


“Smart phones today are probably the most capable computing device that we have and we have it on us all the time,” said Weldon.



“The data that can be extracted from these devices can be put together to build a pattern of life on us: where we go, what we do and when we do it. All of this data is potentially at risk if we’re not being careful about who gets access to our smart phones. That’s a great reason to lock the screen and require at least a password or pin to unlock the phone.”


Gokila Dorai, PhD, assistant professor in the School of Computer and Cyber Sciences, suggests using biometrics to enhance security.


“I would strongly recommend for women, young adults even teenagers, if it’s possible for you to have biometrics as a way to unlock your device, then go for that. These unique ways of unlocking a device would add a layer of protection,” said Dorai.



Dorai is one of the growing experts in the field of mobile forensics and her research projects are federally funded. In addition, several SCCS faculty are mentoring undergraduate and graduate students working on cutting edge research related to mobile device security and digital forensics.


She also suggested adding a two-factor authentication or multi-factor authentication to add an extra layer of security.


When out in the public, it’s easy to connect a mobile device to an unprotected Wi-Fi network. Doing so could open up sites you visit to a hacker. Weldon suggests people should be careful of what apps are used when on public Wi-Fi, since they may expose a lot of personally identifiable information. His suggestion is to use a virtual private network to help protect data that’s being transmitted and received.


“We should recognize the data on our smart phones and protect them accordingly,” added Weldon. “Recognizing the value and sensitivity of the data on our smart phones can guide us in how we protect these devices. We may not think as much about the security and privacy of our smart phones as we do about our laptops and desktops. When we think about everything we use our smartphones for, how ubiquitous they are in our lives, we come to realize just how central they are to today’s lifestyle in the digital age.”


It’s tough to identify when a mobile device has been hijacked, so both Weldon and Dorai suggest paying close attention to any unusual behavior, even small things such as a battery draining faster than usual. Both are indicators you may need to take corrective actions.



Dorai added the government can do more to protect a person’s privacy.


“With the introduction of more and more Internet of Things devices in the market, with several different manufacturers, there’s a lot of user data that’s actually getting exchanged. These days, the most valuable thing in the world is data. So stricter measures are required,” she said.


She indicated it needs to be a collaborative effort between industry, academia, government, and practitioners to come together and work on ideas to strengthen security.



“Yes we want security. We are willing to put up with a little bit of friction for additional security. We want it easy and we generally want it free,” said Weldon. “We don’t read licensing agreements, but we would generally be willing to take certain actions, make certain tradeoffs, to be more secure.”


One other major concern are apps in general. While Google Play Store and Apple routinely remove some apps that may be out of date or have security vulnerabilities, they may still be running on a user’s device.


“Mobile applications may also hide from you in plain sight in the sense the app icons may not be showing up on the screen, but still they are running in the background,” added Dorai.




In essence, the device user is the first line of defense. Taking all the necessary steps to prevent a third party from getting your information is of the utmost importance in the digital age.


“I believe a big part of it this discussion is about user awareness. We want that free app but that app is asking for a lot of permissions. There’s an old saying in cybersecurity: if you are not paying for the product, you are the product. There’s also another saying: if it’s smart, it’s vulnerable,” said Weldon.


Are you a reporter covering Cybersecurity Awareness Month? If so - then let us help with your stories.


Steven Weldon is the Director of  Cyber Institute at the School of Computer and Cyber Sciences at Augusta University and is an expert in the areas of cellular and mobile technology, ethics in computer science, scripting and scripting and automation.


Gokila Dorai is an Assistant Professor in the School of Computer and Cyber Sciences at Augusta University and is an expert in the areas is mobile/IoT forensics research.


Both experts are available for interviews - simply click on either icon to arrange a time today.

Connect with:
Gokila Dorai, PhD

Gokila Dorai, PhD

Assistant Professor

Dr. Dorai’s area of expertise is mobile/IoT forensics research and developing a targeted data extraction system for digital forensics.

Artifical IntelligenceSystem SecurityDigital ForensicsDigital CrimesSoftware Development

You might also like...

Check out some other posts from Augusta University

3 min

Nursing researcher receives over $500K in prestigious grants

For the first time in nearly 15 years, a faculty member from Augusta University’s College of Nursing has been awarded a grant from the National Institutes of Health. Blake McGee, PhD, has secured an R03 award of $176,331 from the Eunice Kennedy Shriver National Institute of Child Health and Human Development to study Medicaid’s expanded role in late postpartum maternal health. But he hasn’t stopped there as McGee is also part of the fifth cohort of Betty Irene Moore Fellows, a prestigious program for nurse leaders and innovators that has awarded CON half a million dollars to support his research project and leadership development. McGee, the prelicensure department chair and an associate professor, is collaborating with colleagues from other Georgia universities on both studies, which are occurring simultaneously. “I began my career as an ER nurse and have always wanted to ask bigger questions about the challenges facing patients and how we might best address them as a society,” said McGee, who was recently selected for publication in Blood Advances, the American Society of Hematology’s journal. “As nursing scientists, we are uniquely poised to ask questions about healthcare policy, specifically from the vantage point of the impact that policy choices have on patients and their health outcomes.” This century, the United States has seen rising maternal mortality rates with alarming racial disparities. Over half of these deaths occur in the postpartum period, with 23% occurring more than six weeks after delivery. Medicaid expansion covers pregnant women in households below 138% of the Federal poverty level through postpartum day 60, which has been associated with decreased mortality and reduced racial disparity in maternal death. At the time of grant submission, pregnancy Medicaid eligibility traditionally lapsed 60 days after delivery, leaving postpartum people vulnerable to disruptions in care. McGee’s work aims to identify changes in maternal health care use and health outcomes 60 days to 1 year after delivery that were associated with state Medicaid expansions (2007–19). The team will examine whether the effects of expansion vary by maternal race or ethnicity and will explore whether patient-reported health care access and quality mediate the relationships between expansion and outcomes. “My hope is that after the study we’ll have a better understanding of how health and health care use change for women in this crucial late postpartum period and how they may differ for people of different backgrounds,” said McGee. “Due to the sample design, findings will reliably inform optimal policy for postpartum coverage duration.” He expects this study to provide preliminary data for a future R01-funded study that directly examines the impact of extending the duration of postpartum Medicaid under the American Rescue Plan. As part of the Betty Irene Moore Fellowship, McGee is one of 15 fellows across the nation in a curriculum co-delivered by the UC Davis School of Nursing and Graduate School of Management. A project coordinator from AU’s School of Public Health will also assist with the fellowship project. McGee hopes to involve graduate research assistants or recent alumni as research associates on the team. Specifically, McGee will be studying the Georgia Pathways to Coverage Program, making him one of the only academic researchers in the nation funded to do so. “As a researcher, it is always a privilege to engage in topics that directly impact the current state of health care, and I’m honored to tackle projects that are so relevant to today’s health policy headlines,” he said. Georgia stands out among other states that are exploring an extension of Medicaid to low-income, working-age adults who demonstrate a monthly commitment of 80 hours to an employment-related activity. By studying the effects of this program, McGee predicts the findings will be highly relevant to anticipating the impact of recent Medicaid changes at the federal level and may indicate differences between Pathways participants and those who might qualify but remain uninsured. This focus could provide data that helps the state target enrollment efforts. The state’s own logic model predicts that the program will reduce hospitalizations, and McGee is eager to determine the program’s success. “Our findings should be helpful to the state to better understand those enrolling, what their experience with increased access to care has been and how their health has improved after receiving coverage,” McGee said.

1 min

#Expert Insights: Leaders share insights of Augusta University, Wellstar partnership at Health Connect South

In the two years since Augusta University and Wellstar Health System formally signed an agreement on August 30, 2023, the historic partnership has continued to evolve into a truly collaborative alliance. At its heart, the mission hasn’t changed: improving the health and wellbeing of all Georgians while educating and preparing the next generation of health care providers through access to world-class training. That was the message shared by Augusta University President Russell T. Keen, Medical College of Georgia at Augusta University Dean David C. Hess, MD, and former Wellstar President and CEO Candice L. Saunders at the recent Health Connect South conference held at the Georgia Aquarium in Atlanta. During their panel “Advancing Healthcare Through Public-Private Partnerships,” the three leaders – each instrumental in helping to create, implement and mold the historic partnership – shared with close to 1,100 attendees their insight into what makes the partnership beneficial for all and how it can be a model for advancing health care and health care education in Georgia and beyond. The full panel discussion is available for viewing here: It was an important event, and a full article is attached below as well. And if you're interested in learning more about the partnership between Augusta University and Wellstar, or connect with Augusta's President Russell T. Keen - simply click on his icon now to arrange an interview today.

2 min

Expert Research: Cyber-Enabled Education Operations: Towards a Strategic Cybersecurity Curriculum for the Social Sciences

Recently, Craig Albert, PhD, was published in the Journal of Political Science Education. The article, 'Cyber-Enabled Education Operations: Towards a Strategic Cybersecurity Curriculum for the Social Sciences,' looks into how U.S. cyber intelligence training is overly technical and should integrate political science and social science courses to build strategic thinkers who understand adversaries’ motives and policies, ultimately strengthening U.S. national security. Craig Albert, PhD, is a professor of Political Science and the graduate director of the PhD in Intelligence, Defense, and Cybersecurity Policy and the Master of Arts in Intelligence and Security Studies at Augusta University. His areas of concentration include international security studies, cybersecurity policy, information warfare/influence operations/propaganda, ethnic conflict, cyberterrorism and cyberwar, and political philosophy. View his profile here. Here's the abstract from the paper in Research Gate: Most cyber intelligence analysts within the United States Intelligence Community (USIC) typically enter the field with strong technical expertise, often derived from degrees in computer science or extensive technical training. However, a critical gap exists in education and training on the strategic dimensions of cyber threats. This paper advocates for the integration of cybersecurity-focused courses within social science disciplines, particularly political science, to cultivate strategic thinkers who can contribute effectively to the USIC. The inclusion of strategic policy coursework in political science curricula, as well as more broadly across social science programs, would better prepare students for careers in the USIC by deepening their understanding of the motivations, capabilities, and intentions of the United States’ strategic adversaries in cyberspace—specifically Russia, China, Iran, and North Korea. Such training would equip analysts with critical insights to improve their effectiveness in identifying, attributing, and mitigating cyber intrusions. Moreover, a stronger emphasis on the human behavior and policy dimensions of cybersecurity would enhance the overall competency of the USIC workforce, thereby strengthening U.S. national security policy. Looking to know more? Let us help. Craig Albert, PhD, is available to speak with media. Simply click on his icon now to arrange an interview today.

View all posts