Tech Blog by Cloud Experts.

From cyber attacks to tech tips - Speak Geek keeps you informed on technology today.

When That Fake App Steals Your ID

FakeAppSusan loved editing photos on her Android phone. 

She’d heard rave reviews from her friends with iPhones about Prisma, a new iOS app for image editing. So when she heard Prisma would soon be released for Android, she logged in to the Google Play Store to see if it was there yet.

To her surprise, she found one that looked just like what her friends were describing. Delighted, she downloaded and started using it. Meanwhile, the app—a fake—was busy installing a Trojan horse on her phone.

When she got to work the next day, she logged her phone into the company network as usual. The malware jumped from her phone to the network. Yet no one knew. Not yet, but that was about to change…

Now, this isn’t necessarily a true story (at least, not one we’ve heard of—yet…), but it absolutely could have been. And similar situations are unfolding as you read this. Yes, possibly even at your company…

Fake apps exploded onto iTunes and Google Play last November, just in time for holiday shopping. Apple “cleaned up” iTunes in an effort to quell users’ concerns, but hackers still find workarounds. Unfortunately, these fake apps pose a real threat to the security of your network. Especially if your company has anything but the strictest BYOD (bring your own device) policies in place. And the more your network’s users socialize and shop on their smartphones, the greater the risk of a damaging breach on your network.

Fake apps look just like real apps. They masquerade as apps from legitimate merchants of all stripes, from retail chains like Dollar Tree and Footlocker, to luxury purveyors such as Jimmy Choo and Christian Dior. Some of the more malicious apps give criminals access to confidential information on the victim’s device. Worse yet, they may install a Trojan horse on that device that can infect your company’s network next time the user logs in.

So what can you do? 

Continue reading

How a Cloud Workspace is Transforming the Way People do Business

BYODIn case you haven’t already heard, utilizing a Cloud Workspace for business is a way that small to medium sized businesses are saving money, time and hassle on a recurring basis. However, it is also transforming the way people do business. 

Continue reading

San Antonio, Don’t Put All Your Cloud Computing Data in One Basket

CloudComputing Basket

Some of our cloud-computing competitors in San Antonio have forgotten a wise old saying, “Don’t put all your eggs in one basket”. Many IT providers have jumped into our market without considering a redundancy issue that is critical to consumers. Read more to see how they have violated this old saying and disappointed their prospects!

Continue reading

Could Rackspace, Headquartered in San Antonio, Have a Weakness with Cloud Desktops?

RackspaceWeaknessFlash back to Blockbuster, this company became a video rental juggernaut overnight by putting many competitors out of business.

Now this enormous company is essentially out of business because they could not keep up with technology.

Did the same thing happen to Rackspace, a datacenter based in San Antonio, which is now looking for a buyer?  Could this defeat be the result of not keeping up with cloud desktop technology?

Continue reading

Is Your IT Support Agreement an Old Jalopy?

OldJalopy

Most of us either had or knew someone that drove an old jalopy, at some point in our lives.

 

Usually the reason for allowing a car to deteriorate is due to a lack of funds or just the result of an extremely lazy maintenance routine.

 

However, why would a successful business allow their IT support agreement to become a Jalopy and how could they tell?

Continue reading

Blog Archive