301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

Part of maintaining security on a mobile device is to protect it from picking up viruses, which means that you need to have a mobile antivirus solution installed. Of course, Google has released its own internal safeguard, called Play Protect, that is supposed to catch malicious apps and updates. By scanning everything that is uploaded to the Play Store, and again before it is installed on each device, Play Protect’s job is to catch malware and other threats before a user’s device is exposed to these nefarious programs.

The trouble is, Play Protect isn’t very good at its job.

When the industry average for real-time malware detection rates is 94.8 percent, and rises to 96.9 percent over four weeks, it isn’t a good sign if your rates are 48.5 percent and 66.3 percent, respectively.

Fortunately, there are antivirus apps available for download with prevention rates that are above-average, many of them free. Many are similar to Play Protect in that they serve as a comprehensive mobile security suite. While the benefits certainly balance out any of the downsides that these apps have, it helps to know the possible downside.

For instance, some antivirus apps (like Avast Mobile Security and McAfee Mobile Security) are supported by ads, which many users may find to be a pain. Norton Security Antivirus doesn’t block a user from visiting a malicious website, but it does allow a user to remotely lock a lost phone via text message.

When so much business can be completed through a mobile device, you owe it to yourself, your employees, and your clients to make sure your mobile devices are well managed, and are as secure as possible. Washington Works can help implement the security solutions, including mobile antivirus, that keep your business safely productive. Reach out to us at 301-571-5040 for more information.

Tip of the Week: 3 Crucial Pieces of HIPAA Complia...
HIPAA and Wearables May Clash in the Near Future
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Business Computing Malware Privacy Hackers Software Network Security Email Business Managed IT Services Internet Backup Tech Term Mobile Devices Ransomware Computer Microsoft Productivity User Tips Google Hosted Solutions Smartphone Data Recovery Android Data Backup Managed Service Provider Productivity Small Business Encryption Business Continuity Social Media Cloud Computing Windows 10 IT Support Data Management Paperless Office IT Services Office 365 Efficiency Browser Business Management Communication Remote Monitoring Hardware Outsourced IT Data Innovation Facebook Disaster Recovery Server Cybersecurity Government BYOD Work/Life Balance Smartphones Tip of the week Infrastructure Workplace Tips Save Money App Bandwidth Holiday Apps Word Hosted Solution Artificial Intelligence Big Data Unified Threat Management Employer-Employee Relationship Phishing Money Applications Document Management Virtual Reality BDR Risk Management Antivirus How To Windows Managed IT Services SaaS Password Chrome Windows 10 File Sharing Chromebook Saving Money Internet of Things Compliance Two-factor Authentication Vulnerability IT Management Regulations Tech Support VPN G Suite Telephone Systems Computing IoT Data Security Server Management Politics Virtual Private Network Taxes Firewall HIPAA Websites Mobile Security Botnet Smart Technology Automation Wi-Fi Identity Theft Passwords Collaboration Twitter Storage Maintenance Computer Care Physical Security Hacker Business Technology Robot Customer Relationship Management Training Office Recovery Remote Computing Patch Management Vendor Management Automobile Scam Alert Health Data loss Blockchain Mobile Device Gmail Samsung WiFi Geography Electronic Medical Records Specifications YouTube Permissions Quick Tips Healthcare Wearable Technology The Internet of Things Printer Motion Sickness GPS High-Speed Internet Legal Social Networking Budget Black Friday Gadgets Settings Fraud Google Drive Office Tips Star Wars Management Social Statistics Access Control Solid State Drive Notifications Tracking Development Sports Motherboard Mail Merge Cyber Monday IT Consultant Digital VoIP Cost Management Techology Enterprise Resource Planning Upgrade Bluetooth SharePoint Meetings Hard Disk Drive Cables Virtualization Address Spyware Unified Threat Management Hotspot Avoiding Downtime Administrator Assessment Wireless Mobile Search IT Technicians Downloads Webcam Education Machine Learning Wires Router VoIP Distributed Denial of Service User Error Language Time Management Black Market Internet Exlporer Crowdsourcing Company Culture Mirgation Multi-Factor Security Point of Sale Cleaning How To Relocation Cortana Modem Managed IT Service Computing Infrastructure Network Management Value Managing Stress Personal Information IBM Managed IT Google Calendar Analytics Private Cloud Supercomputer Update Cookies Break Fix Alerts Touchscreen Downtime IT Support Professional Services Microsoft Office Enterprise Content Management Chatbots Outlook Legislation Web Server Corporate Profile Error IT Budget Nanotechnology Lenovo Dark Web Licensing Website Cabling USB Unified Communications Computer Repair Identity Shortcut Mouse Cameras WannaCry Firefox Communications Digital Payment IT Solutions Screen Reader Superfish Microsoft Excel Cooperation Cybercrime Processors Dongle Law Enforcement Staffing Bring Your Own Device Spam Tablet CCTV Monitors Upgrades Smart Tech Mobile Device Management Service Level Agreement Staff Heating/Cooling Disaster Gadget Network Vulnerabilities Comparison Emoji Connectivity Networking Utility Computing Augmented Reality Servers Travel Uninterrupted Power Supply Safety Hiring/Firing Competition Fun Users Miscellaneous CrashOverride Presentation Managed Service Emergency Wireless Technology 5G Marketing IP Address Customer Service Mobile Office Domains Hard Drives Public Speaking Lithium-ion battery