Archives - Mobile Apps


Install apps only from trustworthy sources

Before downloading an app, conduct research to confirm the app is genuine. Checking the legitimacy of an app may include such thing as: checking reviews, verifying the legitimacy of the app store, and comparing the app sponsor’s official website with the app store link to confirm consistency. Many apps from untrusted sources contain malware that […]

Review mobile app permissions

Review the permissions each mobile app has on your device. Ensure your installed apps only have access to the information they need and remove unnecessary permissions from each app. Consider removing apps with excessive permissions. Pay special attention to apps that have access to your contact list, camera, storage, location, and microphone.

Limit location permissions

Some apps have access to the mobile device’s location services and thus have access to the user’s approximate physical location. For apps that require access to location data to function, consider limiting this access to when the app is in use only.

What are the risks associated with mobile device apps?

Applications (apps) on your smartphone or other mobile devices can be convenient tools to access the news, get directions, pick up a ride share, or play games. But these tools can also put your privacy at risk. When you download an app, it may ask for permission to access personal information—such as email contacts, calendar […]

Update access for Dropbox files from the mobile app

Sharing files over Dropbox is easy and convenient. If you need to revoke access to select files from certain users after their duties have changed, navigate to that file from the mobile app. Then, select the vertical ellipsis to its right and click “Manage access.” You can update the permissions from there.

Only install mobile apps from reputable sources

Jailbreaking, installing apps from unknown sources, and other workarounds that allow free access to paid apps and games can be tempting, but can create large security gaps that allow malware to infect your phone, leaving your personal information at risk.