Hackers and mobile phone numbers
Your mobile number is a critical asset in the music industry. Learn how to protect it from hackers and prevent cloning or SIM swapping, which can severely impact your business and creative control. We're here to help you understand the risks and take proactive steps to secure your digital presence.
If You have an iPhone download this App
Protecting your mobile number in the music industry
We are hoping to help other music artists. The common worry is if your phone number is duplicated or cloned; it is very upsetting and highly alarming when a phone number is compromised, especially for music artists who rely on their phones for business, fan communication, and booking. If your phone number is being duplicated (cloned) or if your SIM card has been "swapped," scammers can access your personal accounts, intercept calls, and impersonate you. Here is a step-by-step guide to help you take back control, based on current cybersecurity best practices:
What should I do immediately if I suspect my phone number has been compromised?
Contact your mobile network provider immediately to report the compromise and request a temporary suspension or new SIM. Also, change passwords for all critical accounts linked to your phone number, such as email, social media, and banking. Act quickly to minimise potential damage.
Why is this particularly important for music artists?
For music artists, a compromised number can disrupt fan communication, affect music distribution, and even impact copyright protection. Scammers could impersonate you for bookings or financial scams, damaging your reputation and livelihood. Your mobile number is a direct link to your professional identity.
What role does my mobile provider play in prevention?
Your mobile provider can implement additional security measures on your account, such as requiring a specific PIN or in-person verification for SIM changes. Discuss these options with them proactively to add layers of security to your account.
How can I prevent SIM swapping or number cloning?
Enable multi-factor authentication (MFA) using authenticator apps instead of SMS where possible. Set up a strong PIN or password with your mobile carrier for account changes, and be wary of suspicious calls or messages requesting personal information. Strong security practices are your best defence.
Where can I find more resources on digital security?
Consult reputable cybersecurity organisations, your mobile network provider's security guides, and resources specifically tailored for artists and creators. Always stay updated on the latest scam tactics and best practices to keep your digital life secure.
How does this affect my music copyright?
If a hacker gains access to accounts used for music distribution or copyright registration (e.g., publishing rights organisations), they could potentially redirect royalties, claim ownership, or otherwise interfere with your intellectual property. Protecting your mobile number is a critical layer of defence for your entire digital identity and creative output.
Digital security for artists involves protecting original work, personal data, and financial information from theft or exploitation. Key measures include using strong, unique passwords with a password manager, enabling two-factor authentication (2FA), regularly backing up files to secure cloud storage, and using watermarks or low-resolution images online.
Key Digital Security Measures for Artists
- Protect Intellectual Property:
- Watermarking: Use subtle, non-distracting watermarks to identify your work online.
- Metadata/EXIF Data: Embed copyright and contact information directly into digital files using tools like Adobe Bridge.
- Layered Files: Keep original PSD or Procreate files to prove ownership in case of theft.
- Blockchain: Utilize blockchain technology for digital art to establish authenticity and immutable records of ownership.
- Copyright Registration: Register work at sites like copyright.gov to make legal action easier if theft occurs.
- Secure Online Presence & Accounts:
- Password Hygiene: Use unique, complex passwords for every account to prevent a single breach from compromising all platforms.
- Two-Factor Authentication (2FA): Enable 2FA on all platforms, including Artwork Archive, social media, and email.
- Update Software: Ensure all software, applications, and operating systems are regularly updated to patch security vulnerabilities.
- Website Security: Use SSL certificates on personal portfolio websites to build trust and secure data.
- Data Protection & Privacy:
- Backups: Regularly backup high-resolution files to secure, reputable cloud services like Google Drive or Dropbox.
- Antivirus/Antimalware: Use security software to scan devices for malicious files.
- VPN Usage: Use a Virtual Private Network (VPN) to encrypt internet connections, especially when using public Wi-Fi.
- Securing Business Operations:
- Restrict Access: Implement an administrative tier model for multi-user accounts to limit access to sensitive information.
- Protect Client Data: Guard collector information, including valuation, purchase history, and personal details, to maintain trust and prevent scams.
- Risk Analysis: Evaluate the value of your digital assets to determine appropriate security investments.
STEPS YOU CAN TAKE TO SECURE YOUR MOBILE NUMBER
Securing your mobile number is crucial to prevent unauthorized access to personal accounts, identity theft, and SIM swapping. Key measures include setting a SIM card PIN, enabling a carrier-level "port-out freeze," replacing SMS-based two-factor authentication (2FA) with authenticator apps, and using burner or virtual numbers for services that do not require your primary number.
Here are the critical steps to secure your mobile number:
1. Carrier-Level Security
- Set a SIM PIN: Prevent your SIM card from being used in another device if your phone is stolen.
- Port-Out Protection/PIN: Contact your mobile operator to set a unique PIN or password for your account, preventing attackers from transferring your number to a new carrier (SIM swapping).
2. Account and Authentication Security
- Use Authenticator Apps: Replace SMS-based 2FA with more secure options like Google Authenticator, Authy, or Microsoft Authenticator.
- Separate Accounts: Do not use your phone number for every account signup. Use email or virtual phone number services.
3. Device and Network Security
- Secure Device Lock: Use strong biometrics, PINs, or passwords to lock your phone.
- Avoid Public Wi-Fi: Do not use unsecured, free public Wi-Fi for banking or sensitive activities.
- Keep Software Updated: Regularly update your OS and apps to patch security vulnerabilities.
4. Proactive Behaviors
- Be Wary of Phishing: Do not click on links in SMS messages, as they can be used to steal credentials.
- Check Privacy Settings: Limit the visibility of your phone number on social media platforms.
- Register on Do Not Call Lists: Use national registries to reduce unwanted telemarketing calls.
If your phone is lost, stolen, or you suspect a breach, immediately contact your service provider and, if necessary, the authorities.
Survey did by the Irish Police / Garda
A 2023 survey found that there are 700,000 more mobile phone subscriptions in Ireland than there are people. Mobile phones have replaced laptops as the primary device we use to connect online - 95% of people have a mobile phone, while almost 90% of people access the internet every day using their phones to connect to the internet, social media and email. At the same time, over 55% of children aged 9-11 own a smartphone which connects them to social media and the internet, often without restriction or supervision. A survey by Webwise found that 65% of parents are unaware of their child’s online activity. We forget that mobile phones are a storage device, a processing computer, a photo gallery, a navigation aid, a mobile bank and a communication hub all combined. Most people use mobile phones for more reasons than any other device they have access to.
Because the phone is in our pocket we believe it is secure and safe. But that’s not always the case. They are nearly always on and connected to a network and the Internet. Insecure Wi-Fi doesn’t necessarily encrypt the personal data we send and doesn’t always require a password or other form of credential to be entered. At the same time, our phones are designed to connect to other devices through Wi-Fi or Bluetooth. This allows files and data to be shared between devices and transfer files very easily.
It has been recognised that our phones carry valuable data and are being targeted by organised criminal groups (O.C.G) - resulting in the data being stolen. Mobile phishing emails have increased by 85%, while many O.C.G’s are creating fake apps that are designed to capture your interest and then your personal information. We make that easier if we don’t update our mobiles with official software patches, anti-virus protections or just lock it down by turning off connection apps such as Bluetooth unless you actually need to use them. Around 60% of people update protections on their mobiles regularly, with many workers expecting their IT section organise the updates for them.
Most mobile phone suppliers provide annual system upgrades and regular updates to software to include patches and fixes for bugs which improve performance and security. Users are asked to permit the upgrade which can be rejected or delayed because it can change features on the phone, but that increases the risk of infection with malware or a cyber-attack. We should always check for updates ourselves.
- Treat your phone as a computer
- Update your phone’s software and virus protections regularly
- Only install known and trusted apps
- Avoid using unsecure free Wi-Fi to connect your phone to the internet or a work network
- Use a separate password or biometric logon such as a fingerprint to lock your phone
- Turn on encryption on your Android phone. You can find out how by searching on Google (With Android its Settings & Security) iPhones have encryption by default when protected with a password or other lock.
More Information and help
You can get more information about mobile security from your service provider, by searching online and from the Garda website or your local Crime Prevention Officer. If your phone is targeted, contact your provider, bank if you store account details on your device, and local Garda Station.
Intellectual property rights provide the framework for protecting musical works, recordings, and performances. These rights empower music as a business, giving the opportunity to creators to control the use of their work, receive fair compensation, and invest in future projects.
Intellectual Property and Music
Music copyright
Authors are the starting point of the music industry. They might reach the market directly or through music publishers. Publishers represent songwriters by authorizing the recording of the song, licensing to streaming platforms, and even to audiovisual productions while also fostering the career development of artists. A music publisher, acting on behalf of authors, ensures that the use of the song is done with the respective remuneration and credit, ensuring that creators are rewarded for their creativity.
While the same music has one or many right owners, the way that music is exploited in the marketplace generates the need to obtain different licenses. There are two main types of licenses needed to exploit the music:
Protecting your creative legacy
The security of your mobile number is intrinsically linked to your music business. A compromised number can severely impact music distribution and even copyright protection, as it's crucial for the authentication of an artist's digital identity. We're highlighting this dreadful problem within the music industry because your creative legacy deserves robust protection. Let's work together to secure your digital presence and ensure your art reaches its audience without compromise.