5 Risks Posed By Mobile Applications That SearchLight Helps You Manage

5 Risks Posed By Mobile Applications That SearchLight Helps You Manage
Michael Marriott
Read More From Michael Marriott
March 14, 2017 | 2 Min Read

Organizations face a wide range of risks online, including cyber threats, data leakage and reputational damage. (You can learn more about digital risk management here). One source of digital risk is mobile application stores, which is why we’re excited to announce that, as of today, Digital Shadows SearchLight™ now monitors for risks posed by mobile applications.

Mobile applications are great for communicating with your employees and customers, but they come with added risk. SearchLight™ continually monitors across official and unofficial stores for five mobile apps that can pose a risk to your organization:

  1. Your Apps. Issues within your own apps, such as self signed certificates or the presence of malware. This includes external and internal applications.
  2. Modified Apps. Versions of your own apps that have been modified by a third party.
  3. Copied Apps. Copies of your own apps on stores that you are not actively managing then on.
  4. Impersonating Apps. Impersonating or spoof apps that mimic your branding or identity.
  5. Affiliate Links. Affiliate links to your own apps that may mislead or confuse users.

For each mobile application, SearchLight analyzes the code to assess what threat it poses to your customers and your organization. If these apps go undetected by your organization, the potential impact can include the theft of customer data, diversion of revenue, brand and reputational damage, and poor customer service.

Mobile application monitoring is not the only thing that’s being released today; we’ve also released an updated user interface. In 2016, Forrester described SearchLight as the “digital risk dashboard of the future”. We’ve taken that dashboard and made it even better (See Figure 1).

Figure 1: SearchLight’s updated user interface

Combined with our existing features, SearchLight’s updated user interface and new mobile application monitoring further improve organizations’ ability to understand the risks they face online. With this improved view of their digital risks, organizations can efficiently focus on the highest priority incidents, keeping their security and reputation intact.

Check out our web page on Digital Risk Management to learn more.

Access Our Threat Intel In Test Drive

Test Drive SearchLight Free for 7 Days
Try It Now

Connect with us

Tags:

Related Posts

Saving the SOC from overload by operationalizing digital risk protection

Saving the SOC from overload by operationalizing digital risk protection

August 5, 2020 | 4 Min Read

As you may have seen last week, the latest...
The story of Nulled: Old dog, new tricks

The story of Nulled: Old dog, new tricks

August 4, 2020 | 9 Min Read

It is often said that old dogs have a hard...
ShadowTalk Update – Garmin ransomware attack, QSnatch malware, and ShinyHunters Stage 2

ShadowTalk Update – Garmin ransomware attack, QSnatch malware, and ShinyHunters Stage 2

August 3, 2020 | 3 Min Read

This week it’s a full house with ShadowTalk...
Dark Web Travel Agencies Revisited: The Impact of Coronavirus on the Shadow Travel Industry

Dark Web Travel Agencies Revisited: The Impact of Coronavirus on the Shadow Travel Industry

July 29, 2020 | 10 Min Read

Back in February, Digital Shadows published...