Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

Part of maintaining security on a mobile device is to protect it from picking up viruses, which means that you need to have a mobile antivirus solution installed. Of course, Google has released its own internal safeguard, called Play Protect, that is supposed to catch malicious apps and updates. By scanning everything that is uploaded to the Play Store, and again before it is installed on each device, Play Protect’s job is to catch malware and other threats before a user’s device is exposed to these nefarious programs.

The trouble is, Play Protect isn’t very good at its job.

When the industry average for real-time malware detection rates is 94.8 percent, and rises to 96.9 percent over four weeks, it isn’t a good sign if your rates are 48.5 percent and 66.3 percent, respectively.

Fortunately, there are antivirus apps available for download with prevention rates that are above-average, many of them free. Many are similar to Play Protect in that they serve as a comprehensive mobile security suite. While the benefits certainly balance out any of the downsides that these apps have, it helps to know the possible downside.

For instance, some antivirus apps (like Avast Mobile Security and McAfee Mobile Security) are supported by ads, which many users may find to be a pain. Norton Security Antivirus doesn’t block a user from visiting a malicious website, but it does allow a user to remotely lock a lost phone via text message.

When so much business can be completed through a mobile device, you owe it to yourself, your employees, and your clients to make sure your mobile devices are well managed, and are as secure as possible. BNMC can help implement the security solutions, including mobile antivirus, that keep your business safely productive. Reach out to us at 978-482-2020 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, November 18 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Business Hackers Business Computing Network Security Software Internet Microsoft Computer Google IT Services Tech Term Hosted Solutions Ransomware Mobile Devices User Tips Efficiency Data Smartphone Communication Small Business Managed IT Services Android Backup Saving Money Data Recovery Business Continuity Hardware IT Support Windows 10 Windows Browser Innovation Internet of Things Cloud Computing Productivity Data Management App Managed IT Services Productivity Data Backup Cybersecurity Upgrade Gmail Artificial Intelligence Disaster Recovery Business Management Encryption Passwords Office 365 Word Server Facebook Microsoft Office Workplace Tips Remote Monitoring Analytics Website communications Infrastructure Windows 10 Network Smartphones Money Tip of the week IT Support Outsourced IT Chrome Managed Service Provider Applications BYOD Phishing Vulnerability Employer-Employee Relationship Company Culture Mobile Device Miscellaneous Social Media IT Management Risk Management Save Money Robot Office Tips Big Data Data storage Government Maintenance Settings Antivirus Google Drive Content Filtering YouTube Bandwidth VPN Access Control Data Security Vendor Management Paperless Office Monitors Education Business Technology Managed Service Apple Server Management Managing Stress Virtual Private Network Touchscreen Storage Automation Data loss Laptop Development Information Unified Threat Management End of Support Telephone Systems Virtual Reality The Internet of Things desktop VoIP HIPAA Firewall Two-factor Authentication SaaS Spam Computing Mobile Security Avoiding Downtime Outlook WiFi Scam Holiday Operating System LiFi Business Intelligence Alert Wireless Hosted Solution Administration Users Display Mouse Regulations Dark Web Office Samsung Automobile Apps Language Value Network Management Hard Disk Drive Cryptocurrency IT solutions Going Green Scary Stories IoT Tech Support Employee-Employer Relationship Dell Google Docs Mirgation Recycling Cyber Monday WannaCry Hacks Running Cable Cookies MSP Cabling Augmented Reality K-12 Schools Legislation Chromebook Device Social Networking Microsoft Excel Social Engineering Google Maps Google Wallet Buisness Computing Infrastructure Professional Services SharePoint LED Bitcoin Printing Sports Star Wars Quick Tips Techology Websites PowerPoint Business Growth Virtual Desktop Chatbots eWaste Managed IT Smart Technology Password Nanotechnology How To Lenovo Legal Wearable Technology Network upgrade Statistics Tablet Motherboard Cables Mail Merge Blockchain Safety Unified Communications Drones Alerts USB Downloads Co-Managed IT Windows 8 Remote Computing Digital Payment Fraud Cost Management VoIP Unified Threat Management Onboarding Hacker Identity Continuity Shortcut Distributed Denial of Service Digital Mobile Device Management Screen Reader Firefox Charging Superfish Slack Disaster Deep Learning Smart Office Bluetooth Comparison Network Congestion Cybercrime Wires Address Permissions Collaboration Downtime Licensing Dongle Content Managed IT Service Writing Marketing Assessment User Error Wi-Fi Digital Signage Alt Codes Solar Patch Management Document Management Spyware Gadgets Smart Tech Customer Relationship Management Monitoring Uninterrupted Power Supply Bring Your Own Device Work Specifications Computers Router Voice over Internet Protocol File Sharing Budget Cooperation Service Level Agreement Heating/Cooling Multi-Factor Security Dark Data Update Streaming Computer Care IBM Social Break Fix Retail Information Technology Hotspot Internet Exlporer Time Management Printer Troubleshooting Solid State Drive Typing Humor Compliance Identity Theft Current Events Halloween Connectivity Networking Politics Spying Best Practice IT Technicians Optimization Search Black Friday Corporate Profile Modem FinTech Emergency Analysis Staff Leominster Servers Google Calendar Customer Service Human Error Training Health Private Cloud Printers G Suite Black Market Supercomputer CrashOverride Staffing Law Enforcement Motion Sickness Notifications Administrator Electronic Medical Records Taxes Twitter IT Budget Physical Security Web Server what was your? GPS Upgrades Gadget Emoji Crowdsourcing IT Consultant Personal Information Botnet Cameras Tracking 3D Printing Meetings Cortana BDR Cleaning Processors Machine Learning CCTV Mobile Computing Regulation Unsupported Software Webcam Virtualization Error Computer Repair Relocation Mobile Data Point of Sale Ben McDonald shares How To Work/Life Balance Travel Recovery

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3