Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

Part of maintaining security on a mobile device is to protect it from picking up viruses, which means that you need to have a mobile antivirus solution installed. Of course, Google has released its own internal safeguard, called Play Protect, that is supposed to catch malicious apps and updates. By scanning everything that is uploaded to the Play Store, and again before it is installed on each device, Play Protect’s job is to catch malware and other threats before a user’s device is exposed to these nefarious programs.

The trouble is, Play Protect isn’t very good at its job.

When the industry average for real-time malware detection rates is 94.8 percent, and rises to 96.9 percent over four weeks, it isn’t a good sign if your rates are 48.5 percent and 66.3 percent, respectively.

Fortunately, there are antivirus apps available for download with prevention rates that are above-average, many of them free. Many are similar to Play Protect in that they serve as a comprehensive mobile security suite. While the benefits certainly balance out any of the downsides that these apps have, it helps to know the possible downside.

For instance, some antivirus apps (like Avast Mobile Security and McAfee Mobile Security) are supported by ads, which many users may find to be a pain. Norton Security Antivirus doesn’t block a user from visiting a malicious website, but it does allow a user to remotely lock a lost phone via text message.

When so much business can be completed through a mobile device, you owe it to yourself, your employees, and your clients to make sure your mobile devices are well managed, and are as secure as possible. Haber Group can help implement the security solutions, including mobile antivirus, that keep your business safely productive. Reach out to us at 866.625.3560 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 24 May 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Email Privacy Hackers Malware Business Internet Business Computing Hosted Solutions Computer Microsoft Software Backup Windows 10 Ransomware Mobile Devices Google Smartphone IT Services Network Security Android Hardware Small Business User Tips Data Management Windows Browser Productivity Server Saving Money Cloud Computing Business Continuity Gmail Data Tech Term Internet of Things App Managed IT Services Efficiency Remote Monitoring Office 365 Upgrade Smartphones Artificial Intelligence Data Recovery Managed Service Provider Encryption Phishing Facebook Innovation Office Tips Productivity Workplace Tips IT Support Data Backup Cybersecurity Government Disaster Recovery Outsourced IT Infrastructure Microsoft Office Big Data Spam Social Media Word Tip of the week Business Management IT Support Managed IT Services IT Management Chrome Data storage Bandwidth Employer-Employee Relationship Antivirus Money WiFi The Internet of Things Communication Miscellaneous Apple Settings Windows 10 Content Filtering Vulnerability Firewall Customer Service Robot Passwords Risk Management Two-factor Authentication Recovery End of Support Google Drive Server Management Website LiFi Telephone Systems Save Money Maintenance Virtual Reality Analytics SaaS Outlook Augmented Reality Search Unified Threat Management Monitors Safety Administration Business Technology Data loss BYOD Automation VoIP Password Mouse Mobile Device Vendor Management Network IBM Wireless Storage Apps Hosted Solution Scam Paperless Office Customer Relationship Management Wi-Fi Tablet Hacking YouTube HIPAA communications Holiday VPN Presentation Printing Avoiding Downtime Applications Data Security Hacker Office Virtual Private Network Wireless Technology Computing Mobile Security IT Technicians Techology IP Address Tech Support Google Maps Cookies Bitcoin How To Laptop Specifications Document Management Online Mail Merge File Sharing Professional Services Information Technology Hotspot Mirgation Network Congestion Unified Threat Management Mobile Office Google Docs Samsung Identity Theft Statistics Websites Hard Drives Nanotechnology Windows 8 Halloween Black Friday Microsoft Excel Address USB Google Wallet Language Chatbots Computers User Error Quick Tips Mobile Device Management Bluetooth Refrigeration Screen Reader Scary Stories Cyber Monday Blockchain Corporate Profile Public Speaking Dongle Drones Computing Infrastructure Identity Display Printer VoIP Lithium-ion battery Smart Tech Social Sports Smart Technology Alerts Education Permissions WannaCry Humor Deep Learning Access Control Time Management Digital Payment Fun Cabling Undo Connectivity Hacks Distributed Denial of Service Licensing Budget Chromebook sip Application Compliance Bring Your Own Device Gadgets SharePoint Network Management Managed IT Virtualization IoT Buisness Managed IT Service Cooperation IT solutions Lenovo Digital telephony Regulations Best Practice Users Downloads Computer Care Touchscreen Shortcut Disaster Star Wars Break Fix Staff Cortana Superfish Spyware Social Networking Business Growth Writing Multi-Factor Security Training Patch Management Automobile Uninterrupted Power Supply Cost Management Current Events Downtime Dark Web User Wearable Technology Legal Dark Data Motherboard Alt Codes Retail Cybercrime Google Calendar Solid State Drive Competition Assessment Going Green Net Neutrality Knowledge Networking How To Remote Computing 5G IT service Router Typing Social Engineering Legislation Heating/Cooling Hard Disk Drive Internet Exlporer Fraud FCC Unified Communications Experience Firefox Operating System Politics BDR Modem Cryptocurrency Marketing Running Cable Comparison Servers Title II Collaboration Value Virtual Desktop CCTV Alert Electronic Medical Records Travel Domains Notifications G Suite Supercomputer Botnet Upgrades Motion Sickness Crowdsourcing Taxes IT Budget Machine Learning 3D Printing Emergency Service Level Agreement Update IT Consultant Relocation Unsupported Software Meetings Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error Mobile Computing Point of Sale Black Market Law Enforcement Physical Security CrashOverride Twitter Gadget Staffing Administrator Personal Information Web Server GPS Computer Repair Cameras Processors Tracking Health