Archives - Mobile Apps


Remove mobile apps when you are finished

Many of us download apps for specific purposes, such as planning or a special event or vacation, and no longer need them afterwards, or we may have previously downloaded apps that are no longer useful or interesting to us. It’s a good security practice to delete all apps you no longer use.

Delete non-critical apps not used for 6 months or more

It’s common to have loads of apps on your devices, many of which you might not have opened in months or even years. Unless they include vital information or functionality, it’s usually sensible to delete them. Not only will you free up space, you’ll save yourself problems arising from their use of outdated or vulnerable […]

Install apps only from trustworthy sources

Before downloading an app, conduct research to confirm the app is genuine. Checking the legitimacy of an app may include such thing as: checking reviews, verifying the legitimacy of the app store, and comparing the app sponsor’s official website with the app store link to confirm consistency. Many apps from untrusted sources contain malware that […]

Review mobile app permissions

Review the permissions each mobile app has on your device. Ensure your installed apps only have access to the information they need and remove unnecessary permissions from each app. Consider removing apps with excessive permissions. Pay special attention to apps that have access to your contact list, camera, storage, location, and microphone.

Limit location permissions

Some apps have access to the mobile device’s location services and thus have access to the user’s approximate physical location. For apps that require access to location data to function, consider limiting this access to when the app is in use only.

What are the risks associated with mobile device apps?

Applications (apps) on your smartphone or other mobile devices can be convenient tools to access the news, get directions, pick up a ride share, or play games. But these tools can also put your privacy at risk. When you download an app, it may ask for permission to access personal information—such as email contacts, calendar […]