Bredy Network Management Corporation Blogs

2 minutes reading time (357 words)

Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

Part of maintaining security on a mobile device is to protect it from picking up viruses, which means that you need to have a mobile antivirus solution installed. Of course, Google has released its own internal safeguard, called Play Protect, that is supposed to catch malicious apps and updates. By scanning everything that is uploaded to the Play Store, and again before it is installed on each device, Play Protect’s job is to catch malware and other threats before a user’s device is exposed to these nefarious programs.

The trouble is, Play Protect isn’t very good at its job.

When the industry average for real-time malware detection rates is 94.8 percent, and rises to 96.9 percent over four weeks, it isn’t a good sign if your rates are 48.5 percent and 66.3 percent, respectively.

Fortunately, there are antivirus apps available for download with prevention rates that are above-average, many of them free. Many are similar to Play Protect in that they serve as a comprehensive mobile security suite. While the benefits certainly balance out any of the downsides that these apps have, it helps to know the possible downside.

For instance, some antivirus apps (like Avast Mobile Security and McAfee Mobile Security) are supported by ads, which many users may find to be a pain. Norton Security Antivirus doesn’t block a user from visiting a malicious website, but it does allow a user to remotely lock a lost phone via text message.

When so much business can be completed through a mobile device, you owe it to yourself, your employees, and your clients to make sure your mobile devices are well managed, and are as secure as possible. BNMC can help implement the security solutions, including mobile antivirus, that keep your business safely productive. Reach out to us at 978-482-2020 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, August 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Malware Business Computing Microsoft Software Hackers Internet Google Business Mobile Devices Network Security Computer IT Services Hosted Solutions Ransomware Tech Term Managed IT Services Small Business Android Backup Smartphone IT Support Windows User Tips Data Recovery Efficiency Saving Money Business Continuity Hardware Data Management Data Backup Data Internet of Things Browser Innovation Cloud Computing App Cybersecurity Windows 10 Encryption Remote Monitoring Gmail Business Management Artificial Intelligence Facebook Server Analytics Smartphones communications Productivity Infrastructure Vulnerability Managed IT Services Chrome Managed Service Provider Phishing Network Word IT Support Outsourced IT Money Productivity Windows 10 Communication Tip of the week Disaster Recovery Office 365 Government Passwords Big Data Antivirus Microsoft Office Settings Data storage IT Management Applications YouTube Robot Risk Management Social Media Website Employer-Employee Relationship Google Drive Office Tips Bandwidth Content Filtering Upgrade Avoiding Downtime The Internet of Things SaaS Scam Apple Storage VoIP Holiday BYOD Data loss Unified Threat Management Alert HIPAA Telephone Systems VPN Mobile Security Data Security Information Maintenance Workplace Tips Firewall Server Management Vendor Management Business Technology Monitors Outlook Save Money Business Intelligence Spam Computing Virtual Private Network WiFi Automation Wireless LiFi Company Culture Hosted Solution End of Support Administration Virtual Reality Mobile Device Mouse Paperless Office Miscellaneous Two-factor Authentication Managing Stress Google Docs User Error Spying Chatbots eWaste WannaCry IT solutions Going Green Patch Management Managed IT Service Star Wars Cabling Analysis Writing Wearable Technology Network upgrade Education Hacks Specifications Wi-Fi Nanotechnology Development Google Maps Customer Relationship Management Alerts USB Bitcoin Heating/Cooling Multi-Factor Security Motherboard Cables Google Wallet Computers Business Growth Time Management Printer Downtime Employee-Employer Relationship Identity Continuity Printing Cybercrime Break Fix Dark Data Fraud Cost Management Legal Marketing Networking Managed Service Retail Smart Office Password Search Black Friday Screen Reader Charging Licensing Dongle desktop Windows 8 Servers Google Calendar Politics Wires Digital Payment Unified Communications Drones Gadgets Emergency Display Disaster Hacker Network Management Access Control PowerPoint Solar Digital Dark Web Customer Service Assessment Deep Learning Office Samsung Work Cyber Monday Smart Tech Collaboration Cooperation Service Level Agreement Legislation Tech Support Router Voice over Internet Protocol Users Halloween Uninterrupted Power Supply Alt Codes Touchscreen SharePoint Onboarding Compliance Document Management Spyware Microsoft Excel Chromebook Hotspot Internet Exlporer Bring Your Own Device Quick Tips Operating System Techology Slack Social Engineering IT Technicians Optimization Computer Care IBM Managed IT Smart Technology Connectivity File Sharing Staff Leominster Solid State Drive Social Statistics Tablet Websites Modem FinTech How To Budget Lenovo Scary Stories Value Typing Humor Downloads Regulations Identity Theft Information Technology Mail Merge Running Cable Blockchain Language Best Practice VoIP Unified Threat Management Buisness Monitoring Safety Mirgation Recycling Training Corporate Profile Current Events Shortcut Distributed Denial of Service IoT Remote Computing Augmented Reality K-12 Schools Hard Disk Drive Bluetooth Comparison Virtual Desktop Cookies MSP Automobile Firefox Superfish Sports Computing Infrastructure Professional Services Dell Cryptocurrency Social Networking Apps Address Laptop Permissions Network Congestion Staffing Motion Sickness Processors Taxes Machine Learning Administrator Web Server what was your? Unsupported Software IT Budget Virtualization GPS Update IT Consultant Computer Repair Relocation Cameras Mobile Data BDR Meetings How To Work/Life Balance Tracking Recovery Cleaning Mobile Device Management Health Private Cloud Regulation Black Market CCTV Webcam Law Enforcement Notifications Mobile Computing Electronic Medical Records Twitter Physical Security Error Point of Sale Ben McDonald shares Upgrades Gadget Emoji Crowdsourcing Travel G Suite Personal Information Botnet 3D Printing Supercomputer CrashOverride Cortana

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3