Emerge Blog

Emerge has been serving the Midwest region since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

Part of maintaining security on a mobile device is to protect it from picking up viruses, which means that you need to have a mobile antivirus solution installed. Of course, Google has released its own internal safeguard, called Play Protect, that is supposed to catch malicious apps and updates. By scanning everything that is uploaded to the Play Store, and again before it is installed on each device, Play Protect’s job is to catch malware and other threats before a user’s device is exposed to these nefarious programs.

The trouble is, Play Protect isn’t very good at its job.

When the industry average for real-time malware detection rates is 94.8 percent, and rises to 96.9 percent over four weeks, it isn’t a good sign if your rates are 48.5 percent and 66.3 percent, respectively.

Fortunately, there are antivirus apps available for download with prevention rates that are above-average, many of them free. Many are similar to Play Protect in that they serve as a comprehensive mobile security suite. While the benefits certainly balance out any of the downsides that these apps have, it helps to know the possible downside.

For instance, some antivirus apps (like Avast Mobile Security and McAfee Mobile Security) are supported by ads, which many users may find to be a pain. Norton Security Antivirus doesn’t block a user from visiting a malicious website, but it does allow a user to remotely lock a lost phone via text message.

When so much business can be completed through a mobile device, you owe it to yourself, your employees, and your clients to make sure your mobile devices are well managed, and are as secure as possible. Emerge can help implement the security solutions, including mobile antivirus, that keep your business safely productive. Reach out to us at 859-746-1030 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 25 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Malware Business Business Computing Productivity Email Internet Backup Hosted Solutions Windows 10 Microsoft Computer IT Services Mobile Devices Network Security Managed Service Provider Google Smartphone Software Ransomware Android User Tips Workplace Tips Hardware Efficiency Smartphones Social Media Business Continuity IT Support Data Innovation Server App Small Business Windows Browser Managed IT Services Facebook Communication Data Management Big Data Disaster Recovery Office Holiday Phishing Office 365 Gmail Encryption Apps Upgrade Miscellaneous Business Management Office Tips Robot Artificial Intelligence Recovery WiFi Password Spam Network Internet of Things Hosted Solution Employer-Employee Relationship Saving Money Save Money How To Money Work/Life Balance Microsoft Office Mobile Device Management Word Data Recovery Alert Firewall Risk Management Hacker Remote Monitoring Cloud Computing Outsourced IT Chrome Customer Service Content Filtering Tip of the week Apple Productivity Virtual Reality Government Cybercrime SaaS VoIP BYOD Two-factor Authentication IT Support IT Management Antivirus Avoiding Downtime Settings Analytics Budget Paperless Office Social Cybersecurity Automation IT service Bandwidth Unified Threat Management Windows 10 Passwords Education Computing Data storage Virtualization Hacking Wi-Fi Document Management HIPAA Server Management IBM Best Practice communications Taxes Competition Mobile Computing Mobile Device Humor Customer Relationship Management Heating/Cooling Data Backup Automobile Mobile Security Vendor Management Computers Tablet Analyitcs Augmented Reality Business Technology Upgrades Computer Care Mouse End of Support Downtime LiFi Tech Support Collaboration Managed IT Services Training Legal YouTube Specifications Search Business Growth File Sharing Maintenance Presentation Politics Telephone Systems Business Owner Scam Wireless Technology Websites Monitors IT solutions Going Green Cortana Physical Security Twitter Google Drive Website VPN Botnet Printing IT Consultant Data Security Sports Safety Vulnerability Bring Your Own Device Samsung Wireless Marketing Virtual Private Network Infrastructure Lithium-ion battery Administration Health Outlook User The Internet of Things Virtual Desktop Running Cable G Suite Google Wallet Printer CrashOverride Electronic Medical Records Crowdsourcing Digital Payment Storage User Error Distributed Denial of Service Documents 5G Address Error Fraud Uninterrupted Power Supply Cryptocurrency Drones Cost Management Access Control Applications How To Statistics Dark Data PDF Hard Disk Drive Unified Communications Bitcoin Cleaning eWaste SharePoint IT Technicians Firefox Bluetooth Windows 8 Administrator Hotspot Update Environment Phone System Undo Downloads Mirgation Law Enforcement BDR Hacks Fun Lenovo Language 3D Printing Quick Tips Chromebook Troubleshooting Multi-Factor Security Gadgets Gadget Google Maps Network Congestion Point of Sale Remote Computing Superfish Computing Infrastructure Unsupported Software Time Management Emoji Staffing Laptop Google Calendar Users Managed IT Managed IT Service Display Business Intelligence Deep Learning Current Events Travel Alerts Corporate Profile Mobile Data Network Management Black Market GPS Operating System Halloween Legislation IP Address Shortcut Break Fix Web Server Co-managed IT Networking Motion Sickness Licensing WannaCry Touchscreen Tracking Scary Stories Comparison Mobile Office Patch Management Dark Web Solid State Drive Cameras Application Cooperation Data loss Personal Information Processors Identity Theft Google Docs Domains Black Friday Machine Learning Microsoft Excel Cabling Writing iPhone CCTV Knowledge Hard Drives Techology Meetings Staff Digital Computer Repair Entrepreneur Supercomputer Public Speaking Cyber Monday Relocation Blockchain Retail Alt Codes Information Technology Experience Consumers Refrigeration Unified Threat Management Webcam Wearable Technology Spyware Servers Notifications IT Budget Buisness Smart Technology Mail Merge Private Cloud Permissions Disaster Social Engineering Typing

Blog Archive

Upcoming Events

No events