It Can’t Be Malware, I Authorized That App Malware is on the rise, and organizations are increasingly seeing threats inside their environments due to third-party applications gaining authorized access. That’s…

It Can’t Be Malware, I Authorized That App

Eric Chaves

Eric is the Director of Technical services, managing the technical Pre/Post Sales, Customer Success and Customer Support teams at CloudLock.

Share

Malware is on the rise, and organizations are increasingly seeing threats inside their environments due to third-party applications gaining authorized access. That’s right, authorized access. This is thanks to the user community being able to readily access a whole host of applications via their phone, tablet device, work computer or home laptop—BYOD is not the future, it’s now.

And you’ve read the recent news: How Crooks and Legit Services Exploit Mobile Devices or Downloader Beware: 95% of Top Free Apps Leak Your Data, so you know the scope of the situation.

Extensive application ecosystems like the Apple App Store and Google Chrome Web Store have provided increased availability and access to these great productivity apps. App vendors have also made them readily accessible on their own websites as well, so this proliferation proves to be a challenge for IT and security admins when users authorize their corporate credentials for access.

This creates the possibility for unfavorable developers and organizations to create malware. Just like email spamming arose to be problematic in the ‘90s and required remediation, these apps need to be reviewed for the risk they may pose to an organization as well as the potential they have to leak sensitive information.

Symptoms of a “sick” device:

  1. Noticeably slow performance
  2. Steady or sharp increase in spam
  3. Leaking data outside the organization

What can you do?

  1. Regularly review applications that are on your device
  2. Check to see if you have apps on your device that you don’t use or look unfamiliar and remove them promptly
  3. Use a third-party detection solution like CloudLock Apps Firewall

CL_blog_CTA_Drive-for-Work-eBook

Share
Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser

Close