{"id":27853,"date":"2019-04-10T06:00:37","date_gmt":"2019-04-10T12:00:37","guid":{"rendered":"https://www.webroot.com/blog/?p=27853"},"modified":"2019-04-24T15:54:35","modified_gmt":"2019-04-24T21:54:35","slug":"how-to-keep-better-tabs-on-your-connected-apps","status":"publish","type":"post","link":"https://www.webroot.com/blog/2019\/04\/10\/how-to-keep-better-tabs-on-your-connected-apps\/","title":{"rendered":"How To Keep Better Tabs on Your Connected Apps"},"content":{"rendered":"\n<p>Not that long ago, before&nbsp;data breaches dominated&nbsp;daily&nbsp;headlines, we felt secure with our social media apps.&nbsp;Conveniently, every website seemed to allow logging in with Facebook or Twitter instead of creating a whole new password, and families of apps quickly became their own industry. Third-party apps and games on social media platforms (remember Farmville on Facebook?) were allowed profile access&nbsp;en&nbsp;masse. Trivia games, horoscope predictions, personality quizzes \u2014&nbsp;all&nbsp;seemingly secure and engaging&nbsp;diversions&nbsp;\u2014 let&nbsp;social media users&nbsp;enable&nbsp;some type of third-party app.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Unfortunately, we now know&nbsp;that&nbsp;this&nbsp;left&nbsp;many of us, and&nbsp;our data,&nbsp;exposed&nbsp;to&nbsp;<a href=\"https:\/\/www.webroot.com\/blog\/2017\/09\/11\/fending-off-privacy-invasion\/\" target=\"_blank\" rel=\"noreferrer noopener\">a potential breach<\/a>.&nbsp;<\/p>\n\n\n\n<p>So we turned to Randy Abrams,&nbsp;Webroot\u2019s&nbsp;Sr. Security Analyst, for insights on how to keep third-party app breaches in check. The trick to keeping yourself and your loved ones safe? Information silos, both on and off of social media.&nbsp;<\/p>\n\n\n\n<p>\u201cAs a rule, I leave my apps in silos, meaning I severely limit their connectivity level \u2014 especially when it comes to accessing my mobile device, \u201cAbrams says. \u201cApps for email, texting, and calling people do have a reasonable need for access to your contacts on the phone. Most other apps, such as social media apps do not need to be able to look up your unsuspecting friends.\u201d&nbsp;&nbsp;<\/p>\n\n\n\n<p>Limiting the access your apps have to their direct functions will help keep you and your loved ones safe.&nbsp;Here\u2019s how to get it done.&nbsp;<\/p>\n\n\n\n<h2>Mobile App Permissions&nbsp;<\/h2>\n\n\n\n<p>Limiting your app\u2019s permissions may seem like a chore, but it is the best way to keep&nbsp;breaches from expanding in scope. We\u2019ve put together a mobile app permissions crash course to help you silo your sensitive data&nbsp;quickly&nbsp;and easily.&nbsp;<\/p>\n\n\n\n<h3>For Android Users&nbsp;<\/h3>\n\n\n\n<p>To monitor and edit an existing application\u2019s accessibility permissions on your device<em>,<\/em>&nbsp;go to your Android\u2019s settings and tap<em> Apps &amp; Notifications<\/em>.&nbsp;From there, you will be able to locate all&nbsp;the applications that are active on your device. When you\u2019ve located the application whose permissions you would like to edit, simply tap the app&nbsp;and then tap \u201cPermissions\u201d to view and edit its current permission&nbsp;settings.&nbsp;<\/p>\n\n\n\n<p>To review an application\u2019s accessibility permissions before you install it on your device&nbsp;from the Google Play Store, tap on the app you\u2019d like to install and click <em>Read more<\/em> to bring up its detail page. Scroll&nbsp;to the bottom and tap <em>App permissions<\/em> to review the app\u2019s requested permissions. After you install and open the application for the first time, you will be prompted&nbsp;to allow or deny application permissions (like access to your contacts or location). You can always&nbsp;edit the application\u2019s existing permissions&nbsp;later&nbsp;using&nbsp;the steps outlined above.&nbsp;<\/p>\n\n\n\n<h3>For iOS Users&nbsp;<\/h3>\n\n\n\n<p>To monitor and edit an existing application\u2019s accessibility permissions on your device, go to the settings app <em>Privacy <\/em>to see all the permissions available on your phone\u202f(like location services and camera access). Select the permission set you would like to review to see all of the applications with access, and revoke any permissions you\u2019re not comfortable&nbsp;with.&nbsp;<\/p>\n\n\n\n<p>To review an application\u2019s accessibility permissions at install,<em>&nbsp;<\/em>simply open the app and begin using it. The app will request permissions, which you can either allow or deny. You can always revoke permissions after they have been granted by following the steps outlined above.&nbsp;<\/p>\n\n\n\n<p>Preventing social media applications from&nbsp;gaining&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.imore.com\/how-adjust-privacy-settings-facebook-app-iphone-and-ipad\" target=\"_blank\">unnecessary access<\/a>&nbsp;to your mobile data could help stop data breaches from spreading. But&nbsp;it won\u2019t&nbsp;stop the breaches themselves from&nbsp;happening. Leaving apps enabled&nbsp;entails&nbsp;large-scale security issues \u2014\u202fnot&nbsp;only&nbsp;for ourselves, but&nbsp;also&nbsp;for&nbsp;friends and family&nbsp;connected with us through social media. When we connect&nbsp;apps&nbsp;to our social media profiles, we expose not just our information, but the shared information of a broader network of connections \u2014 one that expands well beyond&nbsp;our immediate circles. In a startling example, only 53 Facebook users in Australia downloaded Cambridge&nbsp;Analytica\u2019s&nbsp;infamous thisisyourdigitallife app, but&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/gizmodo.com\/just-53-people-used-the-app-that-let-cambridge-analytic-1825140173\" target=\"_blank\">a total of 311,127<\/a>&nbsp;network connections had their data exposed through those users. That amount of collateral damage is nothing to scoff&nbsp;at.&nbsp;<\/p>\n\n\n\n<h2>Removing Third Party Apps&nbsp;<\/h2>\n\n\n\n<p>\u201cFacebook is the&nbsp;company&nbsp;best known&nbsp;for leaking extensive amounts of data about users, usually by default privacy settings that allow third-party apps to access as much user data as possible,\u201d says Abrams. \u201cMost users had no idea they could control some of what is shared and would have a difficult time navigating the maze to the settings.\u201d&nbsp;<\/p>\n\n\n\n<h3>Facebook&nbsp;<\/h3>\n\n\n\n<p>Facebook made a few reform efforts to help make managing third-party access to your account a little bit easier. Click on <em>Settings <\/em>from the account dropdown menu, and then select <em>Apps and Websites<\/em>. This should take you to a dashboard that will show your active, expired, and removed apps. It will also give you the option to turn off the capability for any third-party apps to connect with your profile.&nbsp;<\/p>\n\n\n\n<h3>Twitter&nbsp;<\/h3>\n\n\n\n<p>From your account dropdown, click on <em>Settings and privacy.<\/em> Click on the <em>Apps and devices <\/em>tab, which will show all of the apps connected to your account. You can see the specific permissions that each app has under the app&nbsp;name and description. To disconnect an app&nbsp;from your account, click the <em>Revoke access<\/em> button next to the app&nbsp;icon.&nbsp;<\/p>\n\n\n\n<h3>Instagram&nbsp;<\/h3>\n\n\n\n<p>From a web&nbsp;browser, log in to your account and click the gear icon next the <em>Edit Profile<\/em> button. Select <em>Authorized Apps<\/em> to see all of the apps connected to your account. Click the <em>Revoke Access<\/em> button under an app to remove it from your account.&nbsp;<\/p>\n\n\n\n<h2>Building Secure Social Media Habits&nbsp;<\/h2>\n\n\n\n<p>Monitoring&nbsp;the&nbsp;access levels of your connected apps is a good start to keeping yourself and your loved ones secure, but it\u2019s not always enough.&nbsp;<\/p>\n\n\n\n<p>\u201cIt must be assumed that all third-party apps are collecting all of the information on the platform, regardless of privacy settings,\u201d warns Abrams.&nbsp;<\/p>\n\n\n\n<p>Establishing&nbsp;<a href=\"https:\/\/www.webroot.com\/us\/en\/resources\/tips-articles\/social-network-privacy-google-or-facebook-for-a-safer-experience\" target=\"_blank\" rel=\"noreferrer noopener\">secure social media habits<\/a>&nbsp;will continue&nbsp;to help&nbsp;keep you secure after you\u2019ve reviewed your app permissions. This means conducting regular audits of the third-party app permissions associated with all of your social media accounts and \u2014 slightly more arduously \u2014 thoroughly reading the privacy policies of any third party apps before you connect them.&nbsp;<\/p>\n\n\n\n<p>\u201cIf a person is going to use apps in conjunction with social media platforms, it\u2019s important to understand their privacy policies,\u201d say Abrams. \u201cUnfortunately, with many apps, the privacy policy may not be shown until the app has been installed, and may not even be visible on the developer\u2019s website.&nbsp;When the policy can be located, you\u2019ll often find the user\u2019s friends\u2019 privacy is collateral damage in the agreement. It is up to the individual choosing to decide if their friends\u2019 privacy is acceptable collateral damage.&nbsp;Unfortunately, few know how to obtain the information required to make an informed decision.&nbsp;<\/p>\n\n\n\n<p>\u201cWithout reading the privacy policies you cannot know to what extent your friends\u2019 private information will be shared, \u201cadds Abrams. \u201cRemember, it isn\u2019t just their names you are sharing, it is part of the data aggregation they are already subjected to. Simply letting an app know you are friends provides more information than just their names. It helps app companies build more robust profiles.\u201d&nbsp;<\/p>\n\n\n\n<h2>Stay Vigilant and Informed&nbsp;<\/h2>\n\n\n\n<p>Don\u2019t allow your data or your network to be used beyond your wishes or against your will. Take charge of&nbsp;<a href=\"https:\/\/securitytoday.com\/articles\/2019\/02\/26\/new-report-shows-550-percent-increase-in-consumer-security-risks-connected-to-apps.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">your data security<\/a>, and protect your friends by conducting regular audits of your third-party app permissions. Before you connect any new apps, settle down with a little light reading&nbsp;and thoroughly vet their privacy policy.&nbsp;Given&nbsp;how intertwined our digital lives have become, the cybersecurity of our closest friends and loved ones could&nbsp;well depend on it.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Not that long ago, before&nbsp;data breaches dominated&nbsp;daily&nbsp;headlines, we felt secure with our social media apps.&nbsp;Conveniently, every website seemed to allow logging in with Facebook or Twitter instead of creating a whole new password, and families of apps quickly became their own industry. Third-party apps and games on social media platforms (remember Farmville on Facebook?) were [&hellip;]<\/p>\n","protected":false},"author":109,"featured_media":27855,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2985],"tags":[],"yst_prominent_words":[24223,3775,24219,24207,5109,24225,24231,24213,24227,24209,24215,24221,10001,24233,24229,24211,24217,4701,24235,24237],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/27853"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/109"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=27853"}],"version-history":[{"count":6,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/27853\/revisions"}],"predecessor-version":[{"id":28009,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/27853\/revisions\/28009"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/27855"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=27853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=27853"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=27853"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=27853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}