.
#KTLCyberSecurity top tip.
Invasive Mobile App Permissions – Swimming between the flags!
What are #InvasiveAppPermissions?
Mobile apps can request more permissions than required to complete the task at hand which could be used for other purposes. With every user having on average between 60 to 90 mobile applications on their smartphone, there is a need to consider the permissions granted to mobile applications.
Unfortunately, not all mobile applications are developed equal and there are some that will ask for excessive permissions to complete tasks, collecting more information than what is required along the way.
In this top tip we explore how to make informed decisions around what apps to trust, and what permissions to provide, ultimately knowing what the red flags are to look out for.
How to determine if an app is #trustworthy?
Download from trusted sources: Only download mobile applications from trusted sources such as Apple App Store or Google Play Store. Avoid downloading apps from third-party websites or sources that you do not trust
App Store Reviews: Make informed decisions about what applications to install by checking reviews on App stores and other web sites
New apps: new applications that are all the hype and provide cool features could be a risk if they are not backed up by App Store reviews
Testimonials from Blue chip logos: On mobile application websites look for blue chip organisations that have provided testimonials, there’s an increased chance someone else has already completed the due diligence
Excessive permission requests: If an app asks for excessive permissions, then it may time to stop using it
Location requests: In some case’s mobile apps may ask to track your location which is not related to the purpose of the app, again this could be a red flag
Enrolment process: During the enrolment process App’s may ask for excessive information which is beyond what is required, be careful providing personal information
App privacy policy: If you are on the fence and would like to get a better understanding of the developers position on privacy related matters, then check the App’s privacy policy to determine if your data will be used for other purposes
Check out the carousel on how to decide if app permissions are invasive?
#KTL, ConnectingCommunities, #CyberSecurity, #InvasiveMobileAppPermissions
Comments