Call Today

+1 440-322-ILER(4537)

}
Hours

Mon – Fri, 9am to 5pm

Tech Blog

your go-to resource for all things tech! Stay updated on the latest trends, industry insights, and expert tips to navigate the ever-evolving world of technology.

FaceApp Security Concerns

by | Jul 18, 2019

After going viral, users are being urged to delete FaceApp – the popular app that will take a photo and use several filters to adjust the image.

The Russian-made app is posing security concerns due to the terms of service giving them rights to access and use your data! Upon downloading this app, the user must agree to give access to their photos and data. The terms of service policy also grants the company license to use photos and other personal information uploaded by users for commercial purposes, such as their name, likenesses and voices.

Also, the FaceApp’s policy states that all information possessed by the app could be stored and transferred to the countries from which the app and its affiliates operate from. Meaning all data and information collected can be stored in virtually any country, including Russia.  There is no limit for how long the information is stored, even after its deleted from the app.

There are many apps that trick users into allowing access to information that the app doesn’t need.  You may remember back in 2014 when the iHandy Flashlight app came out – it was designed to track locations, read your calendar, use camera, access unique numbers that identify your phone, and then share that data with ad networks.  Click here to read the article from Wired magazine.

The main point to remember when installing any app is to check out what you are agreeing to when installing it.  We recommend to never give authorization to an app to access data that it doesn’t need to operate, and also rights to use that data carte blanche!

Suspect Your Computer Has Been Hacked? Do These 5 Things Now!

The initial reaction when you suspect your computer or network has been compromised is to panic. However, if your network has been breached, what you do next can make the difference between the incident being a minor inconvenience and being a devastating disaster that...

3 Cyber Security Myths That Will Hurt Your Business This Year

Working amid the ever-changing currents of technology and cyber security, businesses often find themselves entangled in a web of misinformation and outdated ideas. But failing to distinguish between myth and fact can put your business’s security at serious risk. Based...

3 Technology End-of-Service Myths

It's crucial to keep all software and hardware up to date to maintain optimal security. If you don’t, cybercriminals can easily infiltrate your network and the chances for downtime increase significantly. However, many businesses don't realize that expired...

Did you know hardware and software expire too?

We are all aware of the term “use by date.” It is regularly used when talking about food and medications and refers to the date after which the product is no longer safe to consume. However, did you know that your software and hardware can expire too? This is because...

Top 9 Benefits of Outsourcing Your Cybersecurity

When it comes to protecting your business from cyber threats, having the right tools and technology is only half the battle. You also need the expertise, controls, and processes to manage and mitigate these threats effectively. That’s where a managed security service...