<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>essential apps Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/essential-apps/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/essential-apps/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Mon, 24 Apr 2017 18:38:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>essential apps Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/essential-apps/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Attackers Are Using Mobile Devices as a Bridge into Your Network</title>
		<link>https://fosterinstitute.com/attackers-are-using-mobile-devices-as-a-bridge-into-your-network/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 24 Apr 2017 18:38:51 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Infected Apps]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[app safety]]></category>
		<category><![CDATA[apps at risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[essential apps]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[Google Play apps]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Milky Door]]></category>
		<category><![CDATA[network safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2462</guid>

					<description><![CDATA[<p>A newly discovered virus, called Milky Door, permits attackers to connect to your organization’s network through apps on mobile devices. The users have no idea their mobile device is being used in this way. This is an example of how, just because an app is in the app store, that does not mean that the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/attackers-are-using-mobile-devices-as-a-bridge-into-your-network/">Attackers Are Using Mobile Devices as a Bridge into Your Network</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A newly discovered virus, called Milky Door, permits attackers to connect to your organization’s network through apps on mobile devices. The users have no idea their mobile device is being used in this way.<span id="more-2462"></span></p>
<p>This is an example of how, just because an app is in the app store, that does not mean that the app is safe. 200 apps in the Google Play Store are infected. Milky Door has been downloaded millions of times hidden in infected apps.</p>
<p>Apple is not immune to this risk.</p>
<p>One of the best ways to protect against this is to set up a separate wireless network, one that is isolated from your office networks, for employees’ mobile devices to use.</p>
<p>That way, even when a device may be physically present in one of your offices, the device will still be isolated from your network.</p>
<p>The same goes for laptops that sometimes leave the office. Help protect your network by forcing them to connect to a network that is isolated from your office network, even when they are present. They can gain access in the same way they do when working remotely.</p>
<p>A simplified version of this is for you to force all mobile devices, be they BYOD devices or company issued devices, to connect to the guest network at your offices.</p>
<p>The goal is to keep the phones and tablets off your network, so that infected apps won&#8217;t have such easy access into your network&#8217;s resources.</p>
<p>Milky Door has infected many apps before it was even detected. How many apps in app stores are infected with other malware that has yet to be discovered? To help reduce your attack surface, mandate that users only install apps that are essential.</p>
<p>Please forward this to everyone you know who is an executive, or owner of a business that uses mobile devices, so that they can improve their security too. Remember, you can suffer harm from hackers, even when it is someone else’s network that gets hacked.</p>
<p>The post <a href="https://fosterinstitute.com/attackers-are-using-mobile-devices-as-a-bridge-into-your-network/">Attackers Are Using Mobile Devices as a Bridge into Your Network</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
