The Pokemon series has long been known as one of Nintendo?s most popular gaming franchises, and with the release of Pokemon Go, the series has finally made its way to everyday mobile device users. It?s currently ranked as the #1 most downloaded free app on the Apple Store, as well as the Google Play store. The game was such a hit that Nintendo?s stock increased exponentially overnight, and the app has over 26 million users worldwide – more than Tinder, Twitter, Google Maps, and other mobile apps. However, like many extremely popular things, hackers have taken this and exploited it to do their bidding. Prior to the app?s release worldwide, many impatient fans downloaded the APK (Android application package) from third-party websites and ?side-loaded? it onto their devices. This can only be done by going into Android?s settings and allowing app installation from unknown sources. Normally, this is a red flag for any security-minded mobile device user, as some malware is known to infect devices and download apps without the permission of the user; yet, some Pokemon fans just couldn?t wait, and downloaded the APK without thinking of the consequences; like downloading a backdoor. Considering how many countries outside the United States, Australia, and New Zealand, are still waiting for access to Pokemon Go, many have chosen to just use the APK to get the app on their device, rather than wait for the official release. One particular source of the APK provides a modified version of Pokemon Go that, upon installation, installs a backdoor onto the device, which allows for remote access to the device and provides full control over the victim?s phone. The infected version of Pokemon Go is so well-done and inconspicuous that the user likely won?t know that their device has been infected. Security firm Proofpoint suggests that it?s entirely possible that, should infected devices connect to your network, networked resources can also be put at risk. Take a look at the DroidJack-infected app?s permission request, and see for yourself just how strange they might look. https://www.proofpoint.com/sites/default/files/users_content/10/pokemon-fig2.pnghttps://www.proofpoint.com/sites/default/files/users_content/10/pokemon-fig3.png When downloading any app, it?s crucial that you drive this best practice into the heads of your employees: be sure to pay attention to the permissions required by the apps that you download. For example, there?s no real reason why Pokemon Go would need to make phone calls, edit and send text messages, modify your contacts, and record audio. All of this is just asking for disaster. While exploitation of the APK hasn?t been observed in the wild, it represents a dangerous development in mobile applications, one which shows hackers taking advantage of wildly popular smartphone apps, and turning them into catalysts to spread their malware and influence. There are two lessons to be learned. Don?t download apps from unknown sources, even if they?re just games, and make sure that your employees know what your policy on mobile apps is on your in-house network. Also, be sure to examine a new app?s permissions, and only download them from the Apple store or Google Play store. Among your millennial workforce, there may be many users of Pokemon Go, so it?s your responsibility to reach out to them, and educate them on these best practices. After all, ?Gotta catch ?em all,? doesn?t refer to malware infections.
Simply fill out the form on our “Contact” page, or give us a call to set up a private consult. We will provide more detailed information about our company and services, and we will discuss your current situation, as well as your short and long term goals. If it looks like we may be a good fit for each other, we will provide a ballpark estimate to give you an idea of what our services may cost. If that all sounds good, we move forward with a basic audit of your environment and gather more detail about your priorities and needs. We will follow up with a custom proposal, as well as a few client references for your review. There is no cost or obligation involved, and the process can take as little as a few days. If you decide that we are not a fit, or if the timing is just not right, we promise not to bug you with endless sales calls. We will respect your time and privacy, and will be there when you are ready! And remember, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. Isn’t my IT Manager also my CIO? Can you really help me manage my existing IT staff? What is the IT management platform that you mention? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?
The short answer is YES, we can help protect your business. It is very rare that an outside vendor or employee would ever intentionally cause your business harm or disruption, but we understand that it is your job to protect the businesses and minimize risk. As the adage goes, “It’s better to be safe than sorry.” If you feel that things don’t seem right, we can help in several ways. The first step is to have a private & confidential conversation to discuss the situation and assess the risks to the business. The risk assessment will prepare the foundation for an action plan outlining the steps required for a rapid lock-down. As you can imagine, having been in business for over thirty years, we have helped with similar situations before. Often we have responded with an overnight data backup, lock-down, and extraction; and sometimes, we have even helped clear up a misunderstanding which resulted in getting a relationship with an existing vendor back on track. Either way, we are happy to help. And remember, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. How did you know our IT guys name is Larry? What is involved with setting up a cyber security training program? What should be included in a written security policy? Should we be considering moving to the cloud? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?
If your systems are currently working, we can easily back them up and then document them, if your systems are not currently functioning properly then it is already painful and your business is at risk, the sooner you make the change, the better. We often find that even when a new client that we are onboarding has told us that things were “ok” with the previous vendor, when they see how much of a difference having professional IT management can make, they are relieved and excited about the change. I can’t tell you how often a new client tells me that they wished they had made the change years ago! Our systems and process are very transparent, as a client, you have access to our systems, records and all of the documentation about your network. With White Mountain, you are as involved as you want to be and will never feel that you are being left in the dark. Don’t settle for a vendor who uses knowledge as job security. Let us help you get the situation resolved. At White Mountain, we make changing IT vendors EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. Isn’t my IT Manager also my CIO? Can you really help me manage my existing IT staff? What is the IT management platform that you mention? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?
We use a suite of best in class IT management tools to help run our business and deliver exceptional service and value to yours. We offer our larger clients who have in-house IT staff the ability to use our tools and systems to help give their team the best tools and allow seamless collaboration for us to work together on problems, projects, and system administration. Here are some of the tools and systems available to our clients: Professional ticketing system User portal and dashboard A comprehensive System Management platform Network monitoring and alerting system Log management and alerting systems Offsite data backup platform Complete cloud desktop platform Robust documentation portal Enterprise password management system Comprehensive security monitoring and alerting systems and much much more Give us a call today for a confidential consultation, and we will be happy to provide a demo and more information. At White Mountain, we make IT Management EASY! Thanks for visiting, we look forward to hearing from you. Frequently Asked Questions Here are some common questions that we hear from companies your size. Isn’t my IT Manager also my CIO? Can you really help me manage my existing IT staff? What is the IT management platform that you mention? My IT person is the only one that knows my systems, won’t it be painful to switch? I have a dispute with my current IT provider, can you help me lock them out? OK, I want to know more, what’s the next step?