ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Are the Apps on Your Device Safe?

Are the Apps on Your Device Safe?

It’s difficult to judge whether or not an app can expose your business to risk without first downloading it. Despite their best efforts, Google Play and the iTunes store can’t possibly identify every single malicious application out there. Unfortunately, you’re charged with taking the security of your mobile devices into your own hands, but thanks to Google Play Protect, this responsibility is a bit more mild.

Google Play Protect is a new way to help users protect themselves from dangerous smartphone applications. It’s not necessarily an app on your device, but is instead a feature of the Google Play store itself. It’s found on Google Play Services v.11 or higher. Essentially, Google Play Protect scans your apps in the background and looks for anything sketchy going on behind your back. It can also manually scan your device for threats, as well as improve the detection of harmful apps that haven’t been installed through the Google Play store.

One of the major downfalls of Google Play Protect is that it can’t immediately scan an app that you install. Instead, you have to scan the app before you open it for the first time. We recommend that you always approach any new application with caution long before you download it from the Google Play store.

Even with Google Play Protect handling some of the dirty work behind the scenes to keep your devices safe, there are still measures that you can take to augment its approach. Here are just a few of them.

  • Only download apps from trustworthy sources: You might run into links that allow you to download an app to your device. By default, your device won’t let you download apps from external sources, and this is for a good reason. There is a greater chance that your organization could run into a malicious app while outside of the Google Play store. To be safe, only trust those that you find in the store itself.
  • Be wary of app permissions before downloading: Depending on the app you’re downloading, you might find that apps will require permissions to specific information on your device. An easy giveaway that an app isn’t the most secure is when it’s asking for too many permissions than you’re comfortable with. A great example is a flashlight app--why would it need access to your calls or text messages?
  • Consider Bring Your Own Device (BYOD): If each of your employees has a smartphone, a tablet, and a laptop, that’s three devices per user that are accessing important data. Therefore, it makes sense that in order to minimize risk, you implement some type of BYOD strategy that blacklists apps, remotely wipes compromised devices, and enhances mobile security.

Does your business need a way to ensure mobile security? i-medIT can hook you up with a great mobile device strategy that can help your organization minimize risk. To learn more, reach out to us at 630-549-6199.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Hackers Business Computing Microsoft Cloud Backup Innovation Small Business Email Smartphones Malware Software Hardware Android Business Cybercrime Efficiency Windows Mobile Devices Data How To Ransomware Data Backup VoIP Network Security Internet Cybersecurity User Tips Cloud Computing Business Continuity Managed IT Services Browser Social Engineering Chrome Mobile Device Management Productivity Business Management Computers Computer App Windows 10 Money Two-factor Authentication Server Law Enforcement Automation Disaster Recovery Phishing Safety Outsourced IT Alert Collaboration Data Breach Bring Your Own Device Spam Managed IT Services Data Recovery Gadgets Data Security Communication Vulnerability Upgrade Telephone Systems Operating System Smartphone Social Media Internet of Things Office 365 Communications BDR Downtime Data Storage Word Windows 10 Recovery IT Management Router Quick Tips VPN Government OneNote IT Plan Saving Money Network Unsupported Software Internet Exlporer Data storage Data Protection Redundancy Save Money Passwords Spam Blocking Avoiding Downtime Comparison BYOD Gmail The Internet of Things Artificial Intelligence Virtualization Physical Security Remote Monitoring Miscellaneous Business Intelligence Private Cloud Bandwidth Hosted Solutions Google Drive Update Public Cloud Wi-Fi CES Apps Wireless Technology Content Management Computer Fan Google Docs Cast Telecommuting Excel Cleaning Files PDF Google Apps Netflix Tools Sports Office Blockchain FENG Website Remote Work Current Events Tip of the week Tech Support History Employer-Employee Relationship IT Support Robot Password Relocation HIPAA Voice over Internet Protocol Identity Theft Knowledge Windows Server 2008 Laptop Shadow IT Workers Managed IT Chromecast Human Resources Credit Cards Network Congestion Windows 7 Touchpad User Error Infrastructure Settings Botnet HaaS Staff Multi-Factor Security Fraud IT Consultant Flash IT Services Productivity Reputation Password Manager Travel Holiday Big Data DDoS Apple Root Cause Analysis Trending Software Tips Amazon Electronic Medical Records End of Support Customer Business Mangement Outlook Charger Flexibility iPhone Digital Signature Amazon Web Services webinar Sync Internet exploMicrosoft YouTube Marketing Hacking Recycling Windows 10s Humor Computer Care Specifications Networking Managed Service Provider Encryption Meetings Online Shopping Conferencing Hiring/Firing Advertising eWaste Automobile Samsung IBM Legal Patch Management Accountants HBO Evernote Emails Telephony Work/Life Balance Value Criminal Solid State Drive Monitor Data loss Millennials Keyboard Supercomputer Going Green Scam Uninterrupted Power Supply Health Wireless Charging Skype Black Market Microsoft Office NarrowBand Facebook Data Management Audit Screen Mirroring Workforce Budget Frequently Asked Questions Office Tips Hybrid Cloud Cortana Start Menu SaaS Music Video Games Benefits Battery Scalability Firewall Information Technology Education Worker Content Assessment Wearable Technology Workplace Tips Smart Technology Computing Infrastructure Rootkit Audiobook Television Techology USB Instant Messaging Two Factor Authentication Applications Training Remote Computing Entertainment Public Computer Troubleshooting CrashOverride Wireless Users Vendor Management IT Support Thank You Virtual Reality Books Congratulations Save Time Worker Commute Risk Management Mobility Emergency Search Politics How to Employer Employee Relationship Best Practice Webinar Computer Accessories Loyalty WiFi Experience Mobile Device Transportation IT solutions Bluetooth