Emerge Blog

Emerge has been serving the Midwest region since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

Part of maintaining security on a mobile device is to protect it from picking up viruses, which means that you need to have a mobile antivirus solution installed. Of course, Google has released its own internal safeguard, called Play Protect, that is supposed to catch malicious apps and updates. By scanning everything that is uploaded to the Play Store, and again before it is installed on each device, Play Protect’s job is to catch malware and other threats before a user’s device is exposed to these nefarious programs.

The trouble is, Play Protect isn’t very good at its job.

When the industry average for real-time malware detection rates is 94.8 percent, and rises to 96.9 percent over four weeks, it isn’t a good sign if your rates are 48.5 percent and 66.3 percent, respectively.

Fortunately, there are antivirus apps available for download with prevention rates that are above-average, many of them free. Many are similar to Play Protect in that they serve as a comprehensive mobile security suite. While the benefits certainly balance out any of the downsides that these apps have, it helps to know the possible downside.

For instance, some antivirus apps (like Avast Mobile Security and McAfee Mobile Security) are supported by ads, which many users may find to be a pain. Norton Security Antivirus doesn’t block a user from visiting a malicious website, but it does allow a user to remotely lock a lost phone via text message.

When so much business can be completed through a mobile device, you owe it to yourself, your employees, and your clients to make sure your mobile devices are well managed, and are as secure as possible. Emerge can help implement the security solutions, including mobile antivirus, that keep your business safely productive. Reach out to us at 859-746-1030 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 20 September 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Malware Business Business Computing Email Productivity Backup Internet Microsoft Computer Network Security Hosted Solutions Mobile Devices IT Services Software Windows 10 User Tips Google Smartphone Efficiency Managed Service Provider Ransomware Hardware Android Business Continuity Communication Managed IT Services Tech Term Workplace Tips Data Management Small Business Data Social Media Server Smartphones Innovation Browser Facebook Disaster Recovery App Cloud Computing IT Support Windows Business Management Data Recovery Office Network Saving Money Productivity Internet of Things IT Support Big Data Gmail Spam Microsoft Office Apps Artificial Intelligence Cybersecurity Upgrade Holiday Phishing Data Backup Employer-Employee Relationship Office 365 Encryption Miscellaneous Passwords Word Recovery Remote Monitoring Content Filtering BYOD Password Analytics Hosted Solution Office Tips WiFi IT Management Chrome Save Money Money Robot Government How To Paperless Office Avoiding Downtime Apple Work/Life Balance Hacker Firewall Risk Management Windows 10 Outsourced IT Applications Tip of the week Website Bandwidth VoIP Infrastructure Mobile Device Management Data storage Alert communications Business Technology Customer Service Managed IT Services SaaS Settings Budget Hacking YouTube Document Management Vulnerability Social Cybercrime Automation VPN Education Computing Wireless Virtualization Unified Threat Management The Internet of Things Wi-Fi Business Intelligence Antivirus Vendor Management IT service Two-factor Authentication Maintenance Virtual Reality Tech Support LiFi Telephone Systems Downtime End of Support Scam Automobile Marketing Legal Lithium-ion battery Upgrades Search Remote Computing Information User Touchscreen Laptop Running Cable Presentation HIPAA Data loss Data Security Collaboration Chromebook Identity Theft Wireless Technology Competition Mobile Computing IT solutions Monitors File Sharing Digital Cortana Going Green Humor Mobile Security Google Drive eWaste Virtual Private Network Politics Printing Analyitcs Sports Safety Bring Your Own Device Websites Physical Security Server Management Twitter Administration Troubleshooting Botnet Taxes Specifications Business Growth Mobile Device Outlook Virtual Desktop IBM Business Owner Samsung Tablet Storage Best Practice Health Computer Care Cost Management Customer Relationship Management BDR Heating/Cooling Training IT Consultant Computers Augmented Reality Mouse Solar Managed IT Staff Fun Hacks Managed Service Router Corporate Profile Value Network Management Blockchain GPS Legislation Company Culture Shortcut Wearable Technology Consumers Network Congestion Web Server Networking Modem Administrator WannaCry Comparison Professional Services Permissions Update Tracking Deep Learning Managing Stress Patch Management Law Enforcement Display 3D Printing Cameras Current Events Slack Cookies Black Friday USB Documents Fraud Halloween Operating System IP Address Cables Gadget Cabling Unsupported Software CCTV Monitoring Techology Nanotechnology Cyber Monday Dongle PDF Emoji Supercomputer Scary Stories Mobile Office Solid State Drive Wires IT Technicians Travel Spyware Mobile Data Spying Application Unified Threat Management Screen Reader Domains Service Level Agreement Servers Hotspot Black Market IT Budget Google Docs Writing Voice over Internet Protocol Environment Mail Merge Mirgation Phone System Disaster Motion Sickness CrashOverride Smart Technology G Suite Knowledge Employee-Employer Relationship Hard Drives Printer Smart Tech Public Speaking Smart Office Entrepreneur Language Digital Payment Retail Alt Codes FinTech Address Chatbots Uninterrupted Power Supply How To Distributed Denial of Service Gadgets Personal Information Experience Information Technology PowerPoint Refrigeration Access Control Connectivity Work Statistics Computing Infrastructure Processors Buisness Social Engineering Typing MSP Identity Machine Learning Hard Disk Drive Firefox Managed IT Service Users Computer Repair Cleaning Google Wallet Onboarding SharePoint IoT Optimization Bluetooth Alerts User Error Meetings 5G Cryptocurrency Development Relocation Break Fix Drones Digital Signage Downloads Star Wars Recycling Co-managed IT Licensing Notifications Dark Data Unified Communications Compliance Webcam Bitcoin Charging Lenovo Social Networking Private Cloud Quick Tips Dark Web Electronic Medical Records Desktop Multi-Factor Security Assessment Continuity Cooperation Crowdsourcing Google Maps Regulations Point of Sale Windows 8 Analysis Superfish Motherboard Error Time Management Microsoft Excel Staffing iPhone Undo Google Calendar Internet Exlporer

Upcoming Events

No events