7 Questions To Ask Before Investing in VoIP

So you are thinking of moving your office phones over to VoIP? Before you do that, do yourself a favor and read this blog post. It will not only save you money, it will educate you about the various details of VoIP phones. 

Back to posts

That Fake App Just Stole Your ID

fake-app.jpgRyan loved tweaking photos on his Android phone. He’d heard rave reviews from his friends with iPhones about Prisma, a new iOS app for image editing. So when he heard Prisma would soon be released for Android, he logged in to the Google Play

 Store to see if it was there yet. 

 

To his surprise, he found one that looked just like what his friends were describing. Delighted, he downloaded and started using it. Meanwhile, the app—a fake—was busy installing a Trojan horse on his phone. 

 

The Top 10 Most Expensive Computer DisastersWhen he got to work the next day, he logged his phone into the company network as usual. The malware jumped from his phone to the network. Yet no one knew. Not yet, but that was about to change… 

Now, this isn’t necessarily a true story (at least, not one we’ve heard of—yet…), but it absolutely could have been. And similar situations are unfolding as you read this. Yes, possibly even at your company… 

 

Read also: Six Horror Stories of Data Loss

 

Fake apps exploded onto iTunes and Google Play last November, just in time for holiday shopping. Apple “cleaned up” iTunes in an effort to quell users’ concerns, but hackers still find workarounds. Unfortunately, these fake apps pose a real threat to the security of your network. Especially if your company has anything but the strictest BYOD (bring your own device) policies in place. And the more your network’s users socialize and shop on their smartphones, the greater the risk of a damaging breach on your network. 

 

Fake apps look just like real apps. They masquerade as apps from legitimate merchants of all stripes, from retail chains like Dollar Tree and Footlocker, to luxury purveyors such as Jimmy Choo and Christian Dior. Some of the more malicious apps give criminals access to confidential information on the victim’s device. Worse yet, they may install a Trojan horse on that device that can infect your company’s network next time the user logs in. 

 

So what can you do?

First, keep yourself from being fooled. Anyone can easily be tricked unless you know what to look for. Take the following advice to heart and share it with your team: 

 

Beware of Fake Apps! 

In case you weren’t aware, one of the latest and most dangerous Internet scams is fake apps. Scammers create apps that look and behave like a real app from a legitimate store. These fake apps can infect your phone or tablet and steal confidential information, including bank account and credit card details. They may also secretly install on your device malicious code that can spread, including to your company network

 

Take a moment and reflect on these five tips before downloading any app:

  1. When in doubt, check it out. Ask other users before downloading it. Visit the store’s main website to see if it’s mentioned there. Find out from customer support if it’s the real McCoy.
  2. If you do decide to download an app, first check reviews. Apps with few reviews or bad reviews are throwing down a red flag.
  3. Never, EVER click a link in an e-mail to download an app. Get it from the retailer’s website, or from iTunes or Google Play.
  4. Offer as little of your information as possible if you decide to use an app.
  5. Think twice before linking your credit card to any app. 

 

Most importantly, get professional help to keep your network safe. It really is a jungle out there. New cyberscams, malware and other types of network security threats are cropping up every day. You have more important things to do than to try and keep up with them all.

- Ads by Google -


Kevin Gray
ABOUT THE AUTHOR | Kevin Gray
Hello! I am the Vice President @ EnvisionIT Solutions. | Technology Expert | Author | Speaker | Small & Medium Business IT Support - We founded EnvisionIT Solutions in 2007 to provide IT services and support for business owners/CEOs who value the necessity of technology to drive their success and growth.

Find me on:


21-questions

21 Questions To Ask Before Hiring An Honest, Competent, Responsive, Fairly-Priced Computer Consultant

Don’t trust your company’s critical data and operations to just anyone! This business advisory guide will arm you with 21 Revealing Questions you should ask any computer consultant before giving them access to your network.

21 Questions

Recent Posts

7 Questions To Ask Before Investing in VoIP

So you are thinking of moving your office phones over to VoIP? Before you do that, do yourself a favor and read this blog post. It will not only save ...

Read more

Four Common Misconceptions About VoIP

VoIP is often mysterious to most business owners due to the fact that it is a fairly new technology. Unfortunately because of this, there are some mis...

Read more

VoIP is VoIP Right?

With so many companies implementing the same protocol to get calls onto the internet, you’d think one would work just the same as another. Unfortunate...

Read more

Who Uses VoIP and Why?

Why is VoIP such a big deal these days? Businesses with employees in multiple locations have found that VoIP enables them to connect through a single ...

Read more