Hackers and mobile phone numbers

Your mobile number is a critical asset in the music industry. Learn how to protect it from hackers and prevent cloning or SIM swapping, which can severely impact your business and creative control. We're here to help you understand the risks and take proactive steps to secure your digital presence. 

If You have an iPhone download this App 

Protecting your mobile number in the music industry

We are hoping to help other music artists. The common worry is if your phone number is duplicated or cloned; it is very upsetting and highly alarming when a phone number is compromised, especially for music artists who rely on their phones for business, fan communication, and booking. If your phone number is being duplicated (cloned) or if your SIM card has been "swapped," scammers can access your personal accounts, intercept calls, and impersonate you. Here is a step-by-step guide to help you take back control, based on current cybersecurity best practices:

What should I do immediately if I suspect my phone number has been compromised?

Contact your mobile network provider immediately to report the compromise and request a temporary suspension or new SIM. Also, change passwords for all critical accounts linked to your phone number, such as email, social media, and banking. Act quickly to minimise potential damage.

Why is this particularly important for music artists?

For music artists, a compromised number can disrupt fan communication, affect music distribution, and even impact copyright protection. Scammers could impersonate you for bookings or financial scams, damaging your reputation and livelihood. Your mobile number is a direct link to your professional identity.

What role does my mobile provider play in prevention?

Your mobile provider can implement additional security measures on your account, such as requiring a specific PIN or in-person verification for SIM changes. Discuss these options with them proactively to add layers of security to your account.

How can I prevent SIM swapping or number cloning?

Enable multi-factor authentication (MFA) using authenticator apps instead of SMS where possible. Set up a strong PIN or password with your mobile carrier for account changes, and be wary of suspicious calls or messages requesting personal information. Strong security practices are your best defence.

Where can I find more resources on digital security?

Consult reputable cybersecurity organisations, your mobile network provider's security guides, and resources specifically tailored for artists and creators. Always stay updated on the latest scam tactics and best practices to keep your digital life secure.

How does this affect my music copyright?

If a hacker gains access to accounts used for music distribution or copyright registration (e.g., publishing rights organisations), they could potentially redirect royalties, claim ownership, or otherwise interfere with your intellectual property. Protecting your mobile number is a critical layer of defence for your entire digital identity and creative output.

Digital security for artists involves protecting original work, personal data, and financial information from theft or exploitation. Key measures include using strong, unique passwords with a password manager, enabling two-factor authentication (2FA), regularly backing up files to secure cloud storage, and using watermarks or low-resolution images online. 

Key Digital Security Measures for Artists

  • Protect Intellectual Property:
    • Watermarking: Use subtle, non-distracting watermarks to identify your work online.
    • Metadata/EXIF Data: Embed copyright and contact information directly into digital files using tools like Adobe Bridge.
    • Layered Files: Keep original PSD or Procreate files to prove ownership in case of theft.
    • Blockchain: Utilize blockchain technology for digital art to establish authenticity and immutable records of ownership.
    • Copyright Registration: Register work at sites like copyright.gov to make legal action easier if theft occurs.
  • Secure Online Presence & Accounts:
    • Password Hygiene: Use unique, complex passwords for every account to prevent a single breach from compromising all platforms.
    • Two-Factor Authentication (2FA): Enable 2FA on all platforms, including Artwork Archive, social media, and email.
    • Update Software: Ensure all software, applications, and operating systems are regularly updated to patch security vulnerabilities.
    • Website Security: Use SSL certificates on personal portfolio websites to build trust and secure data.
  • Data Protection & Privacy:
    • Backups: Regularly backup high-resolution files to secure, reputable cloud services like Google Drive or Dropbox.
    • Antivirus/Antimalware: Use security software to scan devices for malicious files.
    • VPN Usage: Use a Virtual Private Network (VPN) to encrypt internet connections, especially when using public Wi-Fi.
  • Securing Business Operations:
    • Restrict Access: Implement an administrative tier model for multi-user accounts to limit access to sensitive information.
    • Protect Client Data: Guard collector information, including valuation, purchase history, and personal details, to maintain trust and prevent scams.
    • Risk Analysis: Evaluate the value of your digital assets to determine appropriate security investments. 

STEPS YOU CAN TAKE TO SECURE YOUR MOBILE NUMBER 

 

Securing your mobile number is crucial to prevent unauthorized access to personal accounts, identity theft, and SIM swapping. Key measures include setting a SIM card PIN, enabling a carrier-level "port-out freeze," replacing SMS-based two-factor authentication (2FA) with authenticator apps, and using burner or virtual numbers for services that do not require your primary number. 

Here are the critical steps to secure your mobile number:

1. Carrier-Level Security 

  • Set a SIM PIN: Prevent your SIM card from being used in another device if your phone is stolen.
  • Port-Out Protection/PIN: Contact your mobile operator to set a unique PIN or password for your account, preventing attackers from transferring your number to a new carrier (SIM swapping). 

2. Account and Authentication Security

  • Use Authenticator Apps: Replace SMS-based 2FA with more secure options like Google Authenticator, Authy, or Microsoft Authenticator.
  • Separate Accounts: Do not use your phone number for every account signup. Use email or virtual phone number services. 

3. Device and Network Security

  • Secure Device Lock: Use strong biometrics, PINs, or passwords to lock your phone.
  • Avoid Public Wi-Fi: Do not use unsecured, free public Wi-Fi for banking or sensitive activities.
  • Keep Software Updated: Regularly update your OS and apps to patch security vulnerabilities. 

4. Proactive Behaviors

  • Be Wary of Phishing: Do not click on links in SMS messages, as they can be used to steal credentials.
  • Check Privacy Settings: Limit the visibility of your phone number on social media platforms.
  • Register on Do Not Call Lists: Use national registries to reduce unwanted telemarketing calls. 

If your phone is lost, stolen, or you suspect a breach, immediately contact your service provider and, if necessary, the authorities. 

Survey did by the Irish Police / Garda 

A 2023 survey found that there are 700,000 more mobile phone subscriptions in Ireland than there are people. Mobile phones have replaced laptops as the primary device we use to connect online - 95% of people have a mobile phone, while almost 90% of people access the internet every day using their phones to connect to the internet, social media and email. At the same time, over 55% of children aged 9-11 own a smartphone which connects them to social media and the internet, often without restriction or supervision.  A survey by Webwise found that 65% of parents are unaware of their child’s online activity. We forget that mobile phones are a storage device, a processing computer, a photo gallery, a navigation aid, a mobile bank and a communication hub all combined. Most people use mobile phones for more reasons than any other device they have access to.

 

Because the phone is in our pocket we believe it is secure and safe. But that’s not always the case. They are nearly always on and connected to a network and the Internet. Insecure Wi-Fi doesn’t necessarily encrypt the personal data we send and doesn’t always require a password or other form of credential to be entered. At the same time, our phones are designed to connect to other devices through Wi-Fi or Bluetooth. This allows files and data to be shared between devices and transfer files very easily.

 

It has been recognised that our phones carry valuable data and are being targeted by organised criminal groups (O.C.G) - resulting in the data being stolen. Mobile phishing emails have increased by 85%, while many O.C.G’s are creating fake apps that are designed to capture your interest and then your personal information. We make that easier if we don’t update our mobiles with official software patches, anti-virus protections or just lock it down by turning off connection apps such as Bluetooth unless you actually need to use them. Around 60% of people update protections on their mobiles regularly, with many workers expecting their IT section organise the updates for them.

 

Most mobile phone suppliers provide annual system upgrades and regular updates to software to include patches and fixes for bugs which improve performance and security. Users are asked to permit the upgrade which can be rejected or delayed because it can change features on the phone, but that increases the risk of infection with malware or a cyber-attack. We should always check for updates ourselves.

  • Treat your phone as a computer
  • Update your phone’s software and virus protections regularly
  • Only install known and trusted apps
  • Avoid using unsecure free Wi-Fi to connect your phone to the internet or a work network
  • Use a separate password or biometric logon such as a fingerprint to lock your phone
  • Turn on encryption on your Android phone. You can find out how by searching on Google (With Android its Settings & Security) iPhones have encryption by default when protected with a password or other lock.

More Information and help

You can get more information about mobile security from your service provider, by searching online and from the Garda website or your local Crime Prevention Officer. If your phone is targeted, contact your provider, bank if you store account details on your device, and local Garda Station.

 

What is the IP law for music?
 

Intellectual property rights provide the framework for protecting musical works, recordings, and performances. These rights empower music as a business, giving the opportunity to creators to control the use of their work, receive fair compensation, and invest in future projects.

 

 

Intellectual Property and Music

Harmonizing Creativity in Music and Business
Music is a universal language that transcends borders, cultures, and generations. Music enriches our lives and fuels creative expression. Intellectual property (IP) plays a pivotal role in safeguarding the rights of musicians, composers, and producers, ensuring they can thrive in a competitive global market.
Intellectual property rights provide the framework for protecting musical works, recordings, and performances. These rights empower music as a business, giving the opportunity to creators to control the use of their work, receive fair compensation, and invest in future projects. By understanding and leveraging IP, artists have the building blocks to develop sustainable careers and contribute to the cultural and economic vitality of the global music industry.
The music industry is a dynamic landscape, constantly evolving with technological advancements and changing consumer preferences. From streaming services to live performances, IP rights are essential for navigating this complex environment. Musicians and industry professionals must stay informed about the latest developments in IP law to effectively manage their creative assets.
This year, IP and music were in the spotlight, having been chosen as the official theme of World IP Day 2025, highlighting the pivotal role of intellectual property in supporting a vibrant and diverse music landscape

 

 

Music copyright

Copyright is the cornerstone of the music industry. It protects the originality of songwriters (recognized as authors in copyright laws) in creating songs and ensuring that they are able to monetize their intellectual creations in the vibrant creative industries, including live entertainment, the recording industry, the audiovisual sector, video games, etc. It is the starting point of the music value chain.
Authors need to understand how they can manage their intellectual creations and their respective rights in the music marketplace in order to make the best decisions for them as creators.
 
 
 
Music publishing rights

 

 

Authors are the starting point of the music industry.  They might reach the market directly or through music publishers. Publishers represent songwriters by authorizing the recording of the song, licensing to streaming platforms, and even to audiovisual productions while also fostering the career development of artists.  A music publisher, acting on behalf of authors, ensures that the use of the song is done with the respective remuneration and credit, ensuring that creators are rewarded for their creativity.

 
The recording industry is a fundamental pillar of the music and creative industry as a whole.  It relies on the first recording of the song, the master recording.  The person or entity responsible for the master recording is the phonogram producer, usually known in the market as the record label.  In the recording, the authors (directly or through publishers) authorize the recording of the lyrics and composition, while the performers (singers and musicians) also authorize the recording of their performance.  Once the record is done, the phonogram producer (record label) is recognized related rights over the recording. The rights of the phonogram producer are independent of the rights of authors and performers and refer to the recorded music.
 

While the same music has one or many right owners, the way that music is exploited in the marketplace generates the need to obtain different licenses.  There are two main types of licenses needed to exploit the music:

The use of the music can be done through the making and distribution of copies.  Those two rights are normally referred to as “mechanical rights”.  While this expression might not appear in the copyright law of most countries, the “mechanical license” refers to the authorization needed from the right owners to make copies and disseminate those copies.  Depending on how the music is being exploited, different stakeholders are able to grant this license.  In most cases, at least one of the following should be granted a mechanical license: Authors or publishers, record labels, and/or collective management organizations.
 
Another way to exploit the music is by performing it for the public.  This could be done through live music, ambient sonorization, or event streaming platforms.  Most copyright laws refer to the right of communication to the public, but the industry adopted the public performance license as a contractual practice. Authors, performers, and producers of phonograms own public performance rights.  In case the music is being performed live (without the use of the recorded song), there is no need to obtain a license from record labels but from authors (or publishers).  Most commonly, existing laws facilitate those licenses through collective management organizations that are legally authorized to grant licenses and collect royalties for those uses. Authors need to ensure that their songs are duly registered with the collective management organizations in order to receive compensation for the use of their songs in public.
 
Music is a fundamental part of the audio-visual industry.  There are many different ways an audio-visual or video game project could use music.  A common license to use recorded music in audio-visual projects is called a synchronization license.  It is called synchronization because it syncs the audio with the images of the film, series, video game, etc.  Audio-visual and videogames productions might also commission “new” music to songwriters, and in this case, the contract might include other licenses beyond the synchronization.  Additionally, authors (or publishers) of pre-existing songs might authorize new recordings of the music for use in an audio-visual project.
 
Songwriters might wonder how they can receive royalties if their music is played on TV programs, on the radio, or even in a bar.  On the other side, a restaurant might wonder if they need to obtain a license for every single music they would like to play in the background. This is where the “blanket licenses” come into play. Blanket licenses are authorizations given by a collective management organization to a user who publicly performs all the music that integrates the organization’s catalogue.   In exchange, users should inform the music played and pay the blanket license fee.
Songwriters will receive the royalties proportionally to how much their music is used.  For that to happen, the collective management organization needs to be able to identify not only the music but its right owners.  This is done by registering the song with a local collective management organization, which will match the uses with the fees collected to distribute to all right owners entitled to receive in the country or even elsewhere.
 
Print rights refer to the authorization to transcribe a musical composition, including its lyrics, into sheet music. These rights also cover the distribution of sheet music and lyrics in both physical and digital formats. For example, making merchandising with the lyrics of a song could infringe the rights of the author of the lyrics.  In some circumstances, copyright laws recognize cases where the use of songs will be allowed.  To understand those circumstances, the applicable limitations and exceptions in the territory where the song is being used needs to be considered.

 

Protecting your creative legacy

The security of your mobile number is intrinsically linked to your music business. A compromised number can severely impact music distribution and even copyright protection, as it's crucial for the authentication of an artist's digital identity. We're highlighting this dreadful problem within the music industry because your creative legacy deserves robust protection. Let's work together to secure your digital presence and ensure your art reaches its audience without compromise.