Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

Part of maintaining security on a mobile device is to protect it from picking up viruses, which means that you need to have a mobile antivirus solution installed. Of course, Google has released its own internal safeguard, called Play Protect, that is supposed to catch malicious apps and updates. By scanning everything that is uploaded to the Play Store, and again before it is installed on each device, Play Protect’s job is to catch malware and other threats before a user’s device is exposed to these nefarious programs.

The trouble is, Play Protect isn’t very good at its job.

When the industry average for real-time malware detection rates is 94.8 percent, and rises to 96.9 percent over four weeks, it isn’t a good sign if your rates are 48.5 percent and 66.3 percent, respectively.

Fortunately, there are antivirus apps available for download with prevention rates that are above-average, many of them free. Many are similar to Play Protect in that they serve as a comprehensive mobile security suite. While the benefits certainly balance out any of the downsides that these apps have, it helps to know the possible downside.

For instance, some antivirus apps (like Avast Mobile Security and McAfee Mobile Security) are supported by ads, which many users may find to be a pain. Norton Security Antivirus doesn’t block a user from visiting a malicious website, but it does allow a user to remotely lock a lost phone via text message.

When so much business can be completed through a mobile device, you owe it to yourself, your employees, and your clients to make sure your mobile devices are well managed, and are as secure as possible. BNMC can help implement the security solutions, including mobile antivirus, that keep your business safely productive. Reach out to us at 978-482-2020 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 19 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Hackers Business Computing Software Internet Hosted Solutions Ransomware Microsoft Android IT Services Business Network Security Google Computer Smartphone Windows Backup Mobile Devices Small Business Windows 10 Innovation Internet of Things App Hardware Encryption Data Management Data Business Continuity Browser Smartphones Office 365 Efficiency Saving Money Cloud Computing Artificial Intelligence IT Support Productivity Data Recovery Phishing Managed IT Services Outsourced IT Tip of the week User Tips Gmail Remote Monitoring Facebook Managed Service Provider Business Management Word Risk Management Antivirus Productivity Cybersecurity Robot Google Drive IT Support Chrome Upgrade Settings Server Windows 10 Data storage Money Office Tips Vulnerability Big Data Automation Data Security IT Management Server Management Mouse LiFi Miscellaneous Virtual Private Network Virtual Reality Holiday Communication Telephone Systems Administration Apple Content Filtering Alert SaaS Firewall Analytics Data Backup HIPAA Employer-Employee Relationship Computing Network Mobile Security End of Support Business Technology Government Infrastructure Unified Threat Management Hosted Solution Managed IT Services Bandwidth Workplace Tips YouTube Maintenance Microsoft Office Two-factor Authentication Social Media communications Scam Outlook Monitors Disaster Recovery Save Money Mobile Device Passwords Cooperation WannaCry Current Events VoIP Google Maps WiFi Legislation Cybercrime Microsoft Excel Cryptocurrency Marketing Staff Data loss Going Green Techology Quick Tips Statistics Tablet Storage Blockchain desktop Bitcoin Mail Merge Politics Writing Augmented Reality Digital Printing Unified Threat Management VoIP Bluetooth Collaboration IT solutions Legal Comparison Dark Data Permissions Windows 8 Address Samsung Tech Support Retail Wearable Technology Spyware User Error Document Management Avoiding Downtime Running Cable File Sharing Specifications Customer Service Fraud Buisness Solid State Drive Websites Office Virtual Desktop Printer Time Management Laptop Search Vendor Management Operating System Black Friday Deep Learning Hard Disk Drive Social Emergency Social Engineering Applications Information Technology Access Control Network Management Cabling Best Practice Spam Cyber Monday Bring Your Own Device Hotspot Downtime Safety IT Technicians How To SharePoint Touchscreen Managed IT Gadgets Google Docs Smart Technology Network Congestion Language Hacks Lenovo BYOD Mirgation Firefox Google Wallet Downloads Digital Payment Halloween Disaster Business Growth Shortcut Users Wi-Fi Apps Distributed Denial of Service Computers Computing Infrastructure Password Superfish Education Drones Scary Stories Uninterrupted Power Supply Hacker Patch Management Managed IT Service Display Alerts Website IBM Computer Care Customer Relationship Management Multi-Factor Security Wireless Heating/Cooling Sports Alt Codes Unified Communications Break Fix Licensing Corporate Profile Networking Training Automobile Budget Google Calendar The Internet of Things Servers Humor Dark Web Dell Typing VPN Paperless Office Twitter Staffing Administrator Upgrades what was your? Web Server Processors Remote Computing GPS 3D Printing Cameras Tracking Unsupported Software CCTV Update Mobile Data Notifications Recovery Identity Theft Travel G Suite Crowdsourcing Chromebook Botnet CrashOverride Supercomputer Motion Sickness Physical Security Taxes Emoji Machine Learning IT Budget Personal Information IT Consultant Cortana Relocation Meetings Cleaning Work/Life Balance Virtualization Private Cloud Webcam Computer Repair Mobile Device Management Law Enforcement Error How To Ben McDonald shares Point of Sale Health Black Market Mobile Computing Gadget Electronic Medical Records

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3