Tag Archives: Data

Protect Your Enterprise with the Top Mobile App Security Tips of 2019

A recent study conducted by AppKnox concluded that out of 100 top E-commerce apps, 95% failed basic security testing, 68% had four or more loopholes present in them, and 68% of apps were diagnosed with high severity threats.

Some of the most popular applications, including WhatsApp, Pokemon Go, and Facebook Messenger, are among the most frequently blacklisted among top enterprises due to the security risks they pose.

As a mobile app developer, security can lead to disaster for both your business and your consumers. Here are our top security tips for 2019:

TESTING AND CODE OPTIMIZATION

The two most important processes for building a secure app are extensive testing and constant refinement of code.

Disorganized code often causes data security risks. Minify code to ensure it is clean and concise and does not burden the application. When coding, think like an attacker and address any vulnerability a hacker could use to penetrate your application. Use libraries that show coding errors to ensure you catch security risks.

By budgeting for a rigorous testing and quality assurance process from the outset of the application development process, software developers ensure their applications will be thoroughly secure. Do not allow time-constraints getting a product to market to interfere with this crucial step. Test for functionality, usability, and security. Test, test, and test some more.

SECURE YOUR APIs

Enterprise developers are relying on application programming interfaces (APIs) more than ever, posing additional security requirements. API development and mobile app development share security considerations. Any vulnerability in an API is a vulnerability in the applications that the API connects. Solve potential headaches with the following tips:

  • Ensure all APIs integrated in your app are optimized for security.
  • Monitor all add-on software carefully to ensure that they do not present any system vulnerabilities.
  • Budget time to test the security of your APIs as well.

Check out TechBeacon’s 8 essential best practices for API security for additional reading.

LIMIT DATA COLLECTION AND PERMISSIONS

By collecting as little data as possible and minimizing permissions, app developers limit vulnerable attack points on their app. If the app does not require access to the camera or contacts, don’t request it. The same sentiment can be applied to data: make sure  users are aware of what data your application is collecting from them and only collect user data that is vital to the application’s functionality.

INTEGRATE A SECURITY TEAM FROM DAY ONE

Incorporating a dedicated security team from the inception of the development process on will ensure that the application has a cohesive security strategy intertwined with app functionality. Bringing the security team in from day one will minimize vulnerabilities that otherwise may slip through the cracks if they are brought on later in the process.

PROTECT CONSUMER DATA

Consumer data is generally the most vulnerable element for any app. The higher the volume of consumer data, the more there is for hackers to steal. In addition to limiting data collections, app developers should look into new data encryption technologies and biometric authentication. Decentralized database technology like the blockchain cryptology are among the most high-tech data protection measures tech companies can undertake.

Learn more about the Blockchain for mobile development via Application Development Trends.

CONCLUSION

In order to maintain secure environments, app developers must stay constantly stay up-to-date on the latest security technologies. Reading tech publications and maintaining awareness of the latest trends will ensure your enterprise is ready to integrate with tomorrow’s tech.

How to Safely Encrypt Sensitive Data in Your Mobile App

In November 2014, cybercriminals perpetrated one of the biggest cybercrimes of the decade. They hacked into Sony’s computer systems, stole sensitive data, paralyzed the company’s operations, and gradually leaked embarrassing information to the media. The hackers threatened to continue until Sony agreed to pull the controversial comedy The Interview from its theatrical release.

As the headlines will tell you, the encryption of sensitive data is one of the most important investments a company can make. Facebook is currently under heat for data protection practices. The UK National Crime Agency called WannaCry a signal moment for awareness of cyberattacks and their real world impact. With the stakes higher than ever, the encryption of sensitive data in apps has never been more important.

Here are our top tips on how to safely encrypt sensitive data in your mobile app.

TIP #1: Coding and Testing

Writing secure code is fundemental to creating a secure app. Obfuscating and minifying code so that it cannot be reverse engineered is critical to keeping a secure environment. Testing and fixing bugs when they are exposed should be an ongoing investment of resources as it will pay off in the long run.

Tip #2: Scramble Data

Sometimes, the best method of encrypting data is scrambling. Software and web developers often become obsessed with storing every bit of data in databases and logs, assuming it may be useful later, but doing so can create a target for cybercriminals.

Cunning developers will only store a scrambled version of the data, making it unreadable to the outside eye, but still useful for those who know how to query it correctly.

For an in-depth dive into scrambling data, check out this awesome essay on how Amazon does it.

Tip #3: In Transit Vs. At Rest Encryption

There are two types of data to be encrypted: in transit data and at rest data. In transit data is moving data, be it in transit via email, in apps, or through browsers and other web connections. At rest data is stored in databases, the cloud, computer hard drives, or mobile devices. In transit data can be protected through the implementation of robust network security controls and firewalls. At rest data can be protected through systematically categorizing and classifying data with data protection measures in mind.

Tip #4: Secret Vs. Public Key Algorithms

Secret Key Algorithms are algorithms that use the same key for encryption and decryption. Public-key algorithms us two different encryption keys, one for encryption and the other for decryption. The public key is how the data is sent and the private key decodes it. Public-key algorithms are more secure, but require more computer processing power.

Tip #5: Blockchain Cryptography

We’ve covered the Blockchain in our past article on The Revolutionary Mechanics of the Blockchain. Blockchain cryptography has been on the rise because blockchain databases are distributed and thus more resilient in the face of a DOS attack.

Tip #6: Apps that Clean Up after Themselves 

Apps that collect sensitive information don’t necessarily need to store it. It is wise to delete sensitive data from mobile apps when the data is no longer in active use.

Tip #7 Choose the Right Algorithm

There are several popular pre-existing algorithms in existence that can be used to encrypt sensitive data in mobile apps. Check out UpWork’s awesome rundown:

  1. Advanced Encryption Standard (AES)
  2. RSA
  3. IDEA
  4. Signal
  5. Blowfish and Two Fish
  6. Ring Learning With Errors or Ring-LWE

Over the last 10 years, enterprise-wide use of encryption has jumped by 22 percent according to the Ponemon Institute. When building a mobile app, investing in encrypting sensitive data will pay off in the long run and haunt those that short-change it.

Nougat OS: Everything You Need to Know Android’s Latest Treat

With all the fuss about iPhone 7, iOS 10 and the new Pixel, it’s easy to forget Android recently unveiled their latest OS: Nougat. In line with Android’s other dessert-themed software titles (Marshmallow, Lollipop, KitKat, etc.), Nougat is a treat. It’s a refined version of Marshmallow with improved UX, specs and a lot more. Both iOS fans and app developers take note, here are Android Nougat’s top features:

MULTI-WINDOW MULTITASKING

The most notable feature of Nougat is Multi-Window Multitasking. Unlike iOS, Nougat allows users to run multiple apps on their screen at once, allowing users to watch a movie while they text, view a recipe while they keep their eyes on the timer, or use any number of applications. Multi-Window Multitasking can be utilized with three display options: Split-Screen, Picture-In-Picture and Freeform Mode.

Split-Screen mode splits the screen across the bottom when held vertically, or across the middle when held horizontally.

Picture-In-Picture mode will be optimized for Android TV and will eliminate the controls and interface elements while keeping the content portion to scale.

Freeform mode will allow users to customize the size of each application, like one can with a desktop or laptop computer.

REFINED NOTIFICATIONS SETTINGS

Notifications Settings via How To Geek

Android has always been a major advocate of customizing notifications, and Android Nougat improves their system. Users customize their quick settings to ensure they are only alerted to the top-level notifications. Users can also maintain conversations within the notifications bar to make it easier to chat without having to go back and forth into apps.

Bundled notifications allow users to see what is happening within their apps at a glance without clogging their feed. Simply tap to expand the box and view more info without going directly into the app.

FASTER PERFORMANCE, MORE BATTERY, LESS MOBILE DATA

The best improvements of Nougat OS are not flashy new features, but overall improved functionality. Google’s “Project Doze,” designed to increase phone battery length, was introduced with Marshmallow, but gets a big upgrade with Nougat. Doze shuts down CPU and network activity while the phone screen is off. Previously, Doze only worked when the device was motionless, but now it can operate whenever the screen is off.

Data overages can add up quickly. Google seeks to counter the threat of overages with Data Saver, a program which kicks in whenever the user is on a metered data connection and limits apps and background processes to a set amount of data. Rather than cutting off data usage at a  preset limit, Data Saver makes Android phones more efficient with constant refinement.

Both Data Saver and Project Doze are bolstered by minor technical improvements to Project Svelte, Android’s device optimization initiative, creating a more efficient phone.

SEAMLESS UPDATES

Android isn’t trying to reinvent the wheel. Their Nougat OS functions primarily as a UX improvement over Marshmallow. Android has instilled major security improvements, including file-based encryption. Android has also taken a page out of the Chrome OS playbook by adding seamless updates, which will allow system updates to install in the background.

NEW EMOJIS

On the lighter side of things, Android has installed 72 new glyphs and has revamped their 1,500 emojis to appear more realistic. Nougat is also compatible with Vulkan API, which opens up a world of low-overhead graphical possibilities.

WHEN CAN I GET NOUGAT?

As with any Android update, the real question is: when is it coming to my phone? Nougat is out, but device fragmentation on the Android platform entails a staggered availability based on the hardware. While Google’s Pixel phone could soon alleviate some of these fragmentation problems, Android still cannot move at the speed of iOS—but Nougat’s improved functionality is a welcome addition for both app developers and consumers.

For a full list of Android Nougat release dates, check out this awesome article over at Pocket Lint.

Not Too Pushy: 5 Rules for Pushing App Notifications Without Annoying the User

An application can do great things for a business. It’s a gateway into a digital experience catered to a brand, an opportunity to ingrain a brand into the user’s daily life. Push notifications allow applications to send messages with pertinent information to the user. Some are silent and simply light up the phone screen with a notification, while others vibrate to physically notify the user of more important, time-sensitive information.

The problem is: push notifications are… well… pushy. They can be annoying. It takes a mere Twitter search to prove that when users get annoyed, they take to social media, which is bad for business.

And yet, studies show when push notifications are turned on, they average 88% more launches than those with push notifications disabled. Some studies show up to a 540% increase in daily app opens.

Thus the conundrum becomes: how does one balance between being overly pushy, and not pushy enough? Although each case is subjective, we put together some guidelines for app developers and businesses looking to boost app usage without alienating customers.

1. Make Them Customizable

This is easily the cardinal rule. Do not push your push notifications on the user. Allow them to choose both whether and which push notifications to receive. Give the user options for how frequently they wish to receive notifications and/or what prompts them. There’s no excuse for an overly pushy app and it will be uninstalled.

2. Silent Notifications Work Too

Silent push notifications light up the phone screen with neither a sound nor a vibration. They are great for games, a tempting little offer which may catch the user’s eye when it lights up and lingers on the screen until the smartphone is next unlocked. Diversifying your notifications only makes for a more tolerable digital experience.

3. Analyze Customer Data

App developers have a host of awesome data at their disposal which ought to be utilized in tweaking their apps. If you notice customers often opting out of certain types of notifications, do them a favor and get rid of them. Or make them sign-up for them rather than giving them the work of having to opt-out. As they say, the customer is always right.

4. Geo Detection Is Your Friend

Geo Detection technology allows retailers to detect when a customer last visited their store or when a customer is nearby. Retailers can use Geo Detection technology to put out blasts to all customers in the area of special offers and coupons. For more information on Geo Detection notifications, check out this awesome article.

5. Offer Value

Seamless and GrubHub offer silent push notifications which, when swiped, give the user a discount on their order. Customers are more likely to read push notifications if they know there’s something in it for them. Push notifications are your friend, make sure they are your customer’s too.

Mystic Media is a web and software development company with expertise in iOS and Android application development and strategic marketing. Follow us today on Twitter (@mysticmediasoft), like us on Facebook, and contact us with any questions by clicking here or by phone at 801.994.6815