
Recent Posts
Are your apps a security risk?

Do you own a work phone? Do you install apps onto it? If you answered yes to both of those questions, you’re not alone. Apps are such a vital part of our lives on our smartphones now that if you didn’t use apps on your work phone then chances are you can’t actually do your work.
But could those apps pose a security risk?
Jon Huberman, chief executive of file sharing company Syncplicity seems to think so. “If the enterprise doesn’t provide the users with the tools they expect to do the job, they’ll find the tools themselves” he says, “It’s a huge issue for the company – data leakage is a big problem.”Perhaps you use Dropbox to store work files and have the app installed on your phone. If your device was stolen, how easy would it be for someone to get into your Dropbox account?
Maybe you have installed Instagram or Twitter on your phone. These two applications hoover up data such as email addresses, phone numbers and full names from your phonebook. Or perhaps you use WhatsApp, which now shares data with Facebook in order to send you targeted advertising.
There is also the risk of apps infested with malware. This is generally more of a risk on Android devices, as open source apps are easier to install on Android devices, via a process called sideloading. A recent study found as many as 10 million Android phones were infected with some form of Malware.
For many, the worst a phone hacker can do is get hold of your text messages or your selfie collection. But for some, the data stored on your phone could be extremely damaging if it fell into the wrong hands.
What practical steps can you take to protect yourself and your company?
Firstly, it is important that corporate IT managers have some sort of idea of the sort of apps you’re installing on work devices. Those IT managers must also make it clear to staff what data can and cannot be shared with third-party apps and should provide staff with the necessary tools they require to do their job, so that they aren’t tempted to look elsewhere (Microsoft SharePoint is a more secure alternative to Dropbox for example). Finally, educate your staff to identify risky behaviour and particularly how they avoid falling victim to phishing emails.
By putting these points into practice, you can avoid a damaging security breach in your workplace.
Subscribe here!
Recent Posts
Posts by tag
- technology (125)
- Security (107)
- cyber security (95)
- IT Security (93)
- Microsoft 365 (68)
- modern technology (67)
- Cloud (66)
- Managed Service (65)
- business (63)
- IT support (61)
- cloud computing (60)
- cyber attack (59)
- cloud it (56)
- microsoft (55)
- workplace (55)
- Microsoft Teams (53)
- cybersecurity (53)
- Working from home (51)
- productivity (49)
- office (46)
- office 365 (44)
- IT (43)
- Password Security (41)
- employees (39)
- entrustit (39)
- Uncategorised (38)
- flexible work (37)
- Remote (33)
- Cyber (31)
- efficiency (31)
- Hosted Workspace (30)
- hosted desktop (30)
- schools (29)
- independent schools (28)
- cyber privacy (27)
- it support bournemouth (27)
- school ict (27)
- collaboration (26)
- email security (26)
- 2023 (25)
- it support dorset (24)
- public cloud (24)
- computing (23)
- it support hampshire (21)
- password (20)
- entrust (19)
- passwords (19)
- hosted applications (18)
- it consultancy (18)
- it consultancy bournemouth (18)
- VoIP (17)
- cloud voip (17)
- covid19 (17)
- hacking (17)
- it support southampton (17)
- private cloud (17)
- IT audit (16)
- data (16)
- it consultancy dorset (16)
- it consultancy hampshire (16)
- msp (16)
- ransomware (16)
- teamwork (16)
- Coronavirus (15)
- cloud cctv (15)
- it support winchester (15)
- GDPR (14)
- cctv (14)
- hackers (14)
- internet (14)
- it consultancy southampton (14)
- network (14)
- office 365 support (14)
- Protection (13)
- covid-19 (13)
- hack (13)
- internet safety (13)
- management (13)
- Hosted Desktop and Applications (12)
- IT costs (12)
- Windows Virtual Desktop (12)
- hardware (12)
- hybrid cloud (12)
- windows 10 (12)
- 2020 (11)
- 2022 (11)
- Microsoft Planner (11)
- vulnerabilities (11)
- data breach (10)
- digital (10)
- phishing (10)
- uk (10)
- windows (10)
- Backup (9)
- awards (9)
- bitwarden (9)
- planning (9)
- software (9)
- telephony (9)
- Hampshire (8)
- artificial intelligence (8)
- attack (8)
- communication (8)
- desk phone (8)
- education (8)
- eu (8)
- partnership (8)
- staff (8)
- usecure (8)
- Bournemouth (7)
- Google (7)
- IT Director (7)
- OneDrive (7)
- cloud storage (7)
- infrastructure (7)
- mobile (7)
- offsite backup (7)
- outsource (7)
- 2019 (6)
- Apple (6)
- Dorset (6)
- ISO (6)
- News (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- child protection (6)
- european union (6)
- hacks (6)
- internet of things (6)
- legal (6)
- legal it (6)
- mobile phones (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- resources (6)
- virus (6)
- 3d design desktop (5)
- AI (5)
- Azure (5)
- Case Studies (5)
- Desktop (5)
- Microsoft Copilot (5)
- Multi-Site Business (5)
- Risk assessment (5)
- Thames Valley Tech & Innovation Awards (5)
- Windows 7 (5)
- award winning (5)
- brexit (5)
- designer (5)
- ios (5)
- personal data (5)
- smartphone (5)
- surrey (5)
- united kingdom (5)
- website (5)
- Access Management (4)
- Attacks (4)
- BYOD (4)
- Cyber Essentials (4)
- Cyber Essentials Plus (4)
- DR (4)
- DR planning (4)
- Facebook (4)
- Government (4)
- Microsoft Forms (4)
- SharePoint (4)
- The Business Magazine (4)
- VPN (4)
- WannaCry (4)
- computer performance (4)
- ddos (4)
- disaster recovery (4)
- iot (4)
- law (4)
- legacy (4)
- proactive (4)
- remote learning (4)
- sophos (4)
- wireless internet bournemouth (4)
- 2021 (3)
- 2024 (3)
- AI CCTV (3)
- ChatGPT (3)
- EDR (3)
- General (3)
- Google Drive (3)
- Help (3)
- IP (3)
- Local (3)
- NHS (3)
- New Forest (3)
- Tech Company of the Year (3)
- Tech Growth (3)
- Thames Valley (3)
- Tiva (3)
- Zoom (3)
- award (3)
- big switch off (3)
- budgets (3)
- citrix (3)
- closed cloud (3)
- copilot (3)
- copilot pro (3)
- digital hub (3)
- digital transformation (3)
- guide (3)
- innovation (3)
- instagram (3)
- intelligence (3)
- london (3)
- meetings (3)
- online meetings (3)
- sme (3)
- storage (3)
- teaching (3)
- trump (3)
- twitter (3)
- windows 11 (3)
- 2016 (2)
- 2018 (2)
- 5G (2)
- Bourne Group (2)
- Burhill (2)
- Burhill Group (2)
- CAD (2)
- Dorset Chamber (2)
- Environment (2)
- Firewall (2)
- GPT-4 (2)
- Gen Z (2)
- ISBA (2)
- MDR (2)
- Macs (2)
- Microsoft Autopilot (2)
- Mr Mulligans (2)
- PaaS (2)
- Privacy Shield (2)
- South Coast Tech & Innovation Awards (2)
- Sydenhams (2)
- XDR (2)
- acquisition (2)
- afc bournemouth (2)
- afcb (2)
- android (2)
- bcs (2)
- berkshire (2)
- blockchain (2)
- broadband (2)
- camcloud (2)
- cryptocurrency (2)
- downtime (2)
- dropbox (2)
- east grinstead (2)
- exhibition (2)
- finalist (2)
- legalex (2)
- machine learning (2)
- macos (2)
- modern work (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- reading (2)
- serval systems (2)
- smart buildings (2)
- solent (2)
- strategy (2)
- us (2)
- video conferencing tools (2)
- wireless internet southampton (2)
- 1998 (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BGL Company (1)
- BUNKERS! (1)
- Birchwood Park (1)
- Burnout (1)
- CEO (1)
- Central South Business Awards (1)
- Cloud VMS (1)
- Cloudtango (1)
- Fourth Industrial Revolution (1)
- Go Integrator (1)
- Growth 100 (1)
- Hampshire Business Awards (1)
- Hampshire Chamber (1)
- Harvey Jones Kitchens (1)
- High Growth (1)
- Hoebridge (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Intune (1)
- LLM (1)
- Leaders (1)
- Loop (1)
- M&A (1)
- MFA (1)
- MPLS (1)
- MSP Select 2024 (1)
- Market (1)
- May (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Reid Steel (1)
- SD-WAN (1)
- Surrey Business Awards (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Wifi (1)
- Wycombe Heights (1)
- ashley madison (1)
- b2b (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- big data (1)
- bloatware (1)
- brand (1)
- builders merchant (1)
- business growth (1)
- business process audit (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- co op (1)
- compliance (1)
- connectivity (1)
- copyright (1)
- crime (1)
- dark web (1)
- defence (1)
- dkim (1)
- dmarc (1)
- dns (1)
- donald (1)
- dyn (1)
- eagle eye networks (1)
- election (1)
- enterprise (1)
- epos (1)
- equality (1)
- executive order (1)
- farnham (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- intel (1)
- josh widdicombe (1)
- knights of old (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- meltdown (1)
- millennials (1)
- mimecast (1)
- mirai (1)
- no-deal (1)
- number plate detection (1)
- onsite (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- private equity (1)
- procrastination (1)
- recruitment (1)
- research (1)
- retail (1)
- roundtable (1)
- samsic (1)
- sharefile (1)
- smart sensors (1)
- smishing (1)
- snowden (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- spf (1)
- sterling (1)
- storm (1)
- talktalk (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- utility management (1)
- vault 7 (1)
- vitality stadium (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- women in business (1)
- xiongmai (1)
- year (1)
- zero touch deployment (1)
- zero-trust (1)