Bredy Network Management Corporation Blogs

2 minutes reading time (357 words)

Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

Part of maintaining security on a mobile device is to protect it from picking up viruses, which means that you need to have a mobile antivirus solution installed. Of course, Google has released its own internal safeguard, called Play Protect, that is supposed to catch malicious apps and updates. By scanning everything that is uploaded to the Play Store, and again before it is installed on each device, Play Protect’s job is to catch malware and other threats before a user’s device is exposed to these nefarious programs.

The trouble is, Play Protect isn’t very good at its job.

When the industry average for real-time malware detection rates is 94.8 percent, and rises to 96.9 percent over four weeks, it isn’t a good sign if your rates are 48.5 percent and 66.3 percent, respectively.

Fortunately, there are antivirus apps available for download with prevention rates that are above-average, many of them free. Many are similar to Play Protect in that they serve as a comprehensive mobile security suite. While the benefits certainly balance out any of the downsides that these apps have, it helps to know the possible downside.

For instance, some antivirus apps (like Avast Mobile Security and McAfee Mobile Security) are supported by ads, which many users may find to be a pain. Norton Security Antivirus doesn’t block a user from visiting a malicious website, but it does allow a user to remotely lock a lost phone via text message.

When so much business can be completed through a mobile device, you owe it to yourself, your employees, and your clients to make sure your mobile devices are well managed, and are as secure as possible. BNMC can help implement the security solutions, including mobile antivirus, that keep your business safely productive. Reach out to us at 978-482-2020 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 26 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Hackers Business Computing Software Internet Hosted Solutions Ransomware Computer Business Network Security Microsoft Google Android IT Services Mobile Devices Smartphone Data Management Backup Managed IT Services Windows Small Business Internet of Things Cloud Computing Tech Term App Business Continuity Hardware Browser Innovation Windows 10 User Tips Server Remote Monitoring Data Recovery Saving Money Data Artificial Intelligence IT Support Encryption Productivity Smartphones Outsourced IT Data Backup Vulnerability Managed Service Provider Phishing Productivity Cybersecurity Efficiency Gmail Infrastructure Business Management IT Support Office 365 Tip of the week Antivirus Word Google Drive Settings Chrome Bandwidth Facebook Upgrade IT Management Robot Social Media Risk Management Data storage Windows 10 Office Tips Communication Money Disaster Recovery Managed IT Services Government Passwords Big Data LiFi Firewall Scam Holiday Maintenance Microsoft Office BYOD Hosted Solution Alert Administration Content Filtering Mouse Miscellaneous HIPAA Employer-Employee Relationship VPN Workplace Tips Monitors Analytics Apple Data Security Mobile Security Vendor Management communications Mobile Device Business Technology Save Money Storage YouTube Server Management Applications Virtual Private Network Paperless Office Automation End of Support Website Network Virtual Reality Data loss Unified Threat Management Telephone Systems Outlook Two-factor Authentication Spam SaaS Computing The Internet of Things WiFi Specifications Chatbots Computers Budget Collaboration Customer Relationship Management Star Wars Social VoIP Nanotechnology Typing Humor Downtime Heating/Cooling Multi-Factor Security Wearable Technology Network upgrade Dark Data Information Technology Cybercrime Document Management Spyware Break Fix Motherboard Retail Best Practice Marketing Uninterrupted Power Supply Time Management Printer Alerts USB Current Events IBM Search Black Friday Identity Display Gadgets File Sharing Networking Fraud Cost Management Politics Computer Care Wireless Emergency Screen Reader Cryptocurrency Solid State Drive Servers Google Calendar Customer Service Apps Identity Theft Dark Web Office Samsung Google Docs Network Management Access Control Licensing Dongle IT solutions Going Green Training Corporate Profile Cyber Monday Users Halloween Assessment Education Hacks Tech Support Chromebook Google Wallet Automobile Smart Tech Bitcoin Hard Disk Drive Legislation Microsoft Excel Router Social Engineering Business Growth Dell Touchscreen SharePoint Cooperation Service Level Agreement Printing WannaCry Managed IT Smart Technology Compliance Legal Scary Stories Cabling Quick Tips Techology Hotspot Internet Exlporer Password Websites IT Technicians Unified Communications Drones Running Cable Google Maps How To Lenovo Connectivity Windows 8 Statistics Tablet Mail Merge Blockchain Modem Safety Hacker Buisness Downloads Staff Leominster Shortcut Distributed Denial of Service Regulations Deep Learning Remote Computing Sports VoIP Unified Threat Management Language Value Virtual Desktop Mirgation Network Congestion Laptop Firefox Superfish IoT Bluetooth Comparison Digital Payment Address Permissions Cookies Alt Codes desktop Augmented Reality K-12 Schools Digital Patch Management Managed IT Service Social Networking Writing Bring Your Own Device Operating System Disaster Avoiding Downtime User Error Computing Infrastructure Professional Services Wi-Fi eWaste Virtualization Unsupported Software Cleaning CCTV Update Webcam Computer Repair Relocation Mobile Data Error How To Work/Life Balance Smart Office Recovery BDR Point of Sale Ben McDonald shares Health Private Cloud Black Market Travel Work Law Enforcement G Suite Supercomputer CrashOverride Notifications Electronic Medical Records Staffing Twitter Motion Sickness Physical Security Optimization Emoji Administrator Upgrades Gadget Taxes IT Budget Crowdsourcing Web Server what was your? GPS Personal Information Mobile Device Management Botnet Recycling Cortana 3D Printing IT Consultant Cameras Tracking Processors Meetings Mobile Computing Machine Learning

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3