Macro Systems Blog
Can Your Mobile Apps Be Trusted?
Of course the iTunes and Google Play stores have made efforts to ensure that users can securely browse their app stores, but it’s unlikely that they can find every single malicious app out there before it taints someone’s device. Consequently, you must consider the following measures to ensure that you don’t put your company in peril by downloading unsecure apps.
Google Play Protect is a measure that is helping users recognize malicious apps on their mobile devices. Google Play Protect is not an actual app on your device; it’s a feature that is implemented on the Google Play app store that essentially scans your apps in the background to uncover any dangerous applications on your device. You can also manually scan your device for threats and upgrade harmful app detection by extending the scanning to any apps not installed through the Google Play store. To do this open the Google Play Store App, select the menu on the left, and scroll down and tap Play Protect from the menu.
One notable flaw of Google Play Protect is that it doesn’t instantly scan an installed app. Therefore, Macro Systems recommends scanning the app with Google Play Protect before opening the app for the first time. Another recommendation: approach any new app with a grain of salt, starting even before you download it from the Google Play store.
Although Google Play Protect does offer some ways to keep your mobile devices secure, you should still consider the following tips to approach downloading new apps as mindfully as you can:
- Download apps from reliable sources: There are times when you will find a link to an app while scrolling through frequently asked questions or message boards. Make sure that you don’t download apps from external sources; there is a much greater chance that they could put your business in harm’s way. Be sure that any apps you download are reputable and from the Google Play Store. Many Android phones are set up by default to not allow this.
- Examine app permissions before downloading: Depending on the type of app you’re downloading, you may be asked to allow access to certain information or functions on your device. It's your responsibility to determine whether or not the app is asking for too much access. For example: there is no reason a flashlight app should need access to your calls or text messages.
- Apply a Bring Your Own Device (BYOD) policy: It's likley that your employees have multiple devices (including laptops, tablets, and smartphones) that they bring to the office every day. Accordingly, it makes sense that you have a solution implemented that manages risk from these devices. We recommend a BYOD policy that includes whitelisting and blacklisting apps, remote wiping of compromised devices, and comprehensive mobile security.
To upgrade the way that your business handles mobile devices and security, reach out to Macro Systems at 703-359-9211.
Comments