Streamline your cloud experience and maximise your cloud investment with Microsoft Azure-aligned public cloud services.
Host all of your workloads in the most appropriate location while experiencing the simplicity of one cloud from Six Degrees.
Enhance your cyber security and safeguard your organisation with our cyber security strategy and advisory, consultancy, and managed services.
Connect your business through a comprehensive connectivity portfolio delivered via our owned and operated core Next Generation Network (NGN).
Secure your productivity on any device, anywhere, any time.
Streamline your hosting with comprehensive colocation services delivered from three UK data centres.
Gain clarity and control of your 5G estate, ensuring ongoing cost efficiencies are managed on your behalf through our managed service.
Gain confidence in your cloud direction and achieve accelerated time to value through our assured and optimised cloud services.
Master today’s complex threat landscape and protect your business with our intelligence-led security services.
Videos and webinars are a great way to digest the latest technology insights.
Our eBooks and whitepapers provide in-depth insights from our experts.
Our thought leaders publish regular blogs on up-to-the-minute topics.
Learn all about the latest news from Six Degrees as we continue to evolve.
We host regular in-person and virtual events for our clients.
Discover how Six Degrees has driven success for others.
Learn how we enable our clients to achieve more; providing superior secure solutions, powered by our passionate people.
We are proud to partner with many of the world’s leading vendors, enabling you to leverage our continual investment in difference-making technology.
Learn how CNS at Six Degrees delivers intelligence-led security services that protect organisations in today’s hostile landscape.
We are committed to operating in an environmentally and socially conscious way. Learn more about our commitments as a business.
We are proud of our secure cloud credentials. Learn why we’re one of the most highly accredited providers in the UK.
We are a friendly and passionate bunch here. Whether you want to work with us or for us, we think you’ll enjoy the Six Degrees experience.
Home » Blogs » How to Protect Yourself from Malicious Apps
Have a think about how many times you interact with apps each and every day. So many of us have social media apps to keep up with friends, banking apps to manage our finances, and travel apps that help us get to where we need to go. But as the NCSC recently noted, apps “can also be installed on laptops, computers, games consoles, wearable devices (such as smartwatches or fitness trackers), smart TVs, smart speakers (such as Alexa devices), and IoT (internet of things) devices”.
The ubiquity of apps makes them attractive to hackers, who seek to use weaknesses in app stores to share malicious apps that can steal data and money – as well as location data and even personal health information.
We all need to take steps to protect ourselves. But how? In this blog I’ll take you through some best practices you should follow.
Technology leveraging apps is not going anywhere any time soon, so we all need to start using best practices when interacting with them – whether that’s on a phone, laptop, console or smart device. Here are the steps I would recommend you take to protect yourself from the threat of malicious apps:
We are all familiar with taking care when downloading software from the Internet these days; if it doesn’t look right, we know it’s probably not right and we simply move on without downloading it. With our app stores it can be different; because they are provided by the vendors we feel safe, and all apps are generally presented in more or less the same way – meaning it’s very difficult to get that feeling that introduces doubt over the authenticity of an application. We need to be cautious, though.
The reason this is so important is because malicious apps can give hackers their first foothold in your network. They don’t care if that’s your phone or your TV – they are just looking for an ‘in’. Once the hacker finds their opportunity, and in a similar way to phishing, they will look to escalate their privileges, move laterally and then maximise their control and reward through stealing data, bank details or simply deploying ransomware across more than just the device that they were able to compromise initially.
While the government is reviewing advice to start giving us better visibility to security ratings of apps and looking to hold app store vendors accountable for security assurance, we are not there yet – remain vigilant!
Robert Sugrue is Cyber Security Product Director at Six Degrees. At Six Degrees, we’ve been helping organisations confront cyber security challenges for over 15 years. While cyber threats are always developing, our experience and industry presence is testament to our ability to stay ahead of emerging threats.
The next step on your organisation’s cyber security journey may be our Cyber Security Maturity Assessment. Six Degrees conducts a comprehensive cyber security maturity and benchmarking assessment, delivered and managed in a consultant-led approach that provides you with point-in-time or ongoing visibility into your organisation’s security posture.
Contact us and speak to one of our experts today.
Cyber security Maturity calculator Analyse your cyber security…
Fortify your organisation’s security posture by evaluating your…
Managed Detection and Response Managed Detection and Response…
More information on our Privacy and Cookies Policy can be found here: https://www.6dg.co.uk/privacy-cookies/. You can update how we contact you in the future by visiting our Communications Preference Centre here: https://www.6dg.co.uk/preference-centre/.