Always Connected, Always at Risk: How AI is Reshaping Mobile Security | JNUC

AI is amplifying mobile threats. Learn how Zero Trust and layered defense protect today’s always-connected enterprise endpoints.

October 14 2025 by

Jamf

Artificial intelligence (AI) is transforming the mobile threat landscape, making attacks faster, smarter and harder to detect. At JNUC 2025, leaders from Verizon shared how attackers weaponize generative AI, smishing and deepfakes to exploit mobile endpoints.

Their message to security professionals? Mobile devices are now the weakest link – yet the most critical asset to protect. During this session, learn how Zero Trust, layered defenses, and user vigilance safeguard the always-connected workforce.

The new mobile reality: five hours, endless exposure

Modern workforces are inseparable from their mobile devices. On average, users check their phones more than 200 times per day, spending nearly five hours on screens that blend personal and professional data. Verizon’s Mobile Security Index (MSI) found that 95% of organizations now rely on mobile or IoT devices for daily operations, yet investments in mobile security remain far below other IT areas.

This imbalance creates a wide gap in enterprise defenses.

Attackers understand that mobile devices sit at the intersection of:

  • Identity

  • Productivity

  • Convenience.

Every email, authentication prompt and app download introduces potential risk, especially when the same device connects to these networks:

  • Home

  • Public

  • Corporate

When trust fails: the human link in AI-driven attacks

Despite layers of software and secure networks, people remain the most vulnerable point in the security chain. Verizon reinforced the principle that defines modern security strategy: trust nothing — verify everything.

AI has sharpened social engineering attacks. Smishing messages and phishing pages now feature perfect grammar, convincing design and contextual cues that mimic legitimate communication. Even experienced professionals fall victim to urgent-sounding messages or calls that trigger emotional responses. Deepfake technology adds another layer of deception, allowing attackers to impersonate executives or colleagues in real-time.

Verizon shared examples where victims were manipulated into transferring large sums or revealing credentials. In every case, the initial compromise began with a single interaction that bypassed caution. As AI refines threat actor’s tactics, continuous awareness and education — not annual compliance modules — become vital lines of defense.

Layer defenses for a mobile-first world

Protecting mobile endpoints requires more than a single security tool.

Verizon’s network protections and Jamf’s on-device management, identity, and security solutions illustrate how multiple layers work together to close gaps across the attack surface.

Verizon blocks roughly ten billion unwanted calls and over one billion smishing attempts each year through network-level filtering. On-device solutions then inspect applications, behaviors and configurations that signal risk, preventing malware or data exfiltration before it spreads. Combining network telemetry with endpoint analytics gives enterprises visibility across the full path of a potential attack – from entry point to device response.

This layered approach ensures that even if one control fails, another stands ready to detect or contain the breach. For organizations with distributed workforces and diverse device fleets, defense in depth is no longer optional – it’s a foundational necessity.

How AI is changing both sides of the fight

AI has fundamentally altered the tempo of cybersecurity. Threat actors use large language models (LLM) to automate smishing campaigns, craft persuasive phishing sites and generate malicious code. Jailbroken and unregulated AI tools allow adversaries to test and refine these tactics rapidly, reducing the technical barriers once required for large-scale attacks.

Conversely, defenders are integrating AI into their security stacks. Machine Learning (ML) models monitor traffic patterns, detect anomalies and correlate threat intelligence faster than human analysts can. When combined with endpoint telemetry from solutions like Jamf Protect and network insights from carriers such as Verizon, AI improves early detection and speeds up response times.

The challenge is not simply adopting AI but using it responsibly.

Ethical, explainable models help organizations defend against bias and ensure visibility into how automated systems make decisions. This is critical for maintaining trust and compliance in regulated industries.

Never trust, always verify: Zero Trust in practice

Zero Trust is not a marketing slogan; it’s a model that continuously verifies every connection, user and device before granting access to protected resources.

Mobile endpoints, often outside traditional perimeters, must authenticate each request before gaining access to data or applications. Applying Zero Trust to mobile means enforcing device compliance checks and identity validation in real -time. If a device falls out of compliance or connects from an untrusted network, access should automatically adapt or be revoked. Integrating mobile threat defense with identity providers and policy engines ensures decisions are made dynamically based on risk tolerance – not location or device type.

As 5G and IoT adoption expands, the principle remains constant: verify continuously, reduce implicit trust and contain breaches before they spread.

Building resilience through policy, training and technology

Technology alone cannot secure an organization. Policies, user education and well-defined processes form the other half of resilience. Verizon highlighted simple but effective practices, such as using shared code words for executive validation, requiring secondary approval for high-value transfers and segmenting home networks from corporate networks on work devices.

Ongoing training builds security reflexes

Instead of one-time modules, organizations benefit from:

  • Simulated smishing exercises

  • Peer discussions

  • Real-world examples

Regular reporting on phishing engagement rates helps security leaders measure progress and identify where additional reinforcement is needed.

Ultimately, security depends on balance: strong technology layered with human judgment.

By combining mobile threat defense tools, Zero Trust architecture and a culture of verification, enterprises can reduce exposure while maintaining the flexibility that mobility provides.

Key takeaways

  • Mobile devices are the most- targeted and least- protected endpoints.

  • AI accelerates both attacks and defense; speed and adaptability determine success.

  • Zero Trust verification must extend to every device and user.

  • Continuous education builds lasting awareness beyond compliance checkboxes.

  • Network, endpoint and identity integrations deliver stronger, scalable protection.

Visit the Jamf blog for JNUC updates, session recaps and more!