• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Student360
  • About
    • Secure360
    • UMSA
  • Secure360 2022
  • For Sponsors
  • For Speakers
  • Get Involved
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Identifying an unsafe app

June 15, 2018 by Secure360 and UMSA

A vector image of three cell phones showing different apps you can download

Copyright: vasabii / 123RF Stock Photo

At this time in our world, there’s an app for almost everything. There is an app for the coffee shop down the road and the highly popular bar in the center of town. There are also apps that help pass the time with colorful games, help you to stay organized with a variety of tools and claim the latest and greatest offers at well-loved stores. The list goes on and it’s no longer a surprise when we hear, “there’s an app for that.”

Downloading new apps can be fun, exciting and even helpful! However, before hitting the download button you’ll want to be sure the app you are downloading isn’t infected with any type of malware. Phones contain sensitive data that requires protection. Learn how to identify an unsafe app and prioritize app security with the steps below.

Always check your sources

Apps can be downloaded from a variety of sources including an app store or from a direct USB connection. First, it’s important to determine if an app is a first-party app or a third-party app. An app designed by the vendor of your phone would be considered a first-party application and a third-party app can be identified if it was created by someone else. Now, that doesn’t automatically suggest that all apps from an app store are safe to download and that third-party apps should be considered unsafe. It is important to know how to identify where an app is coming from to then determine if it is safe to download. Examine components such as the terms of service, app developer criteria and if the marketplace has removed such vendors due to displaying poor content.

Know your vendor and developer

Who supplies an app to the user? This can be found at the vendor or developer. A link to the vendor’s website should be located on the app’s page within the app store. If you’re coming up short and don’t see a link, search for the vendor online. Once there, take a look at the website, privacy and security policies, vendor contact information and determine how user information is collected and used. If you begin to notice an unprofessional looking website paired with an unclear privacy policy, it may be in your best interest to find a different app.

Ask for permission

After installing an app, it will likely ask for your permission on a few things. (If it doesn’t, consider un-installing.) Vendors may ask for permission to access your location, images and videos, text messages and your network. It’s easy to skim over these and simply disregard what an app may be asking of you. Simply be aware of these permissions and take the time to read through them. It is an option to control what an app can and cannot access, but if the list of permissions is long it may be cause for concern.

Review the ratings, rate the reviews

This one is simple – look at user ratings, reviews and numbers! Is the app well received by other users and is there a generous number of downloads? If so, you’re on your way to being in the clear. If not, reevaluate the installation of the app.

In simple terms, your role is to be a responsible consumer. Following the suggestions above will allow you to familiarize yourself with identifying safe and unsafe characteristics of apps, as well as websites and more. For more security tips, visit the Secure360 blog where you can learn about cybersecurity, business continuity, physical security and other related topics.

Filed Under: Cybersecurity

About Secure360 and UMSA

The Secure360 and UMSA team is made up of professionals in the security and risk management industries. Topics of expertise range from physical security, IT, risk management, cybersecurity, cloud, information security and records management.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Bryghtpath LLC
    Bryghtpath LLC: Bryghtpath CEO @bryanstrawser presented last week at the @Secure360 Conference on "Navigating the Ransomware Challe… https://t.co/iXa3JeRKNN
    about 1 day ago

  2. Scott Sutherland
    Scott Sutherland: For those who missed it, here's a video of the "Building Ransomware Detections" presentation I gave @Secure360 last… https://t.co/DkjNZnCfRw
    about 1 day ago

  3. 🟣Tyler Cohen Wood
    🟣Tyler Cohen Wood: @HaroldSinnott @Secure360 Thank you, @HaroldSinnott!
    about 2 days ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2022 Secure360. All rights reserved.