Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Prioritizing Security with Your Messaging Apps

Prioritizing Security with Your Messaging Apps

If you asked your average person whether they are okay with their personal information being taken and used by businesses, you’d probably come across quite a bit of dissent. Ironically, it seems that people will give it right over via social media programs, but you are beginning to see some pushback when using apps. WhatsApp, the messaging app owned by Facebook, that is known for end-to-end encryption, has told users that they will soon be forced to share their personal data with Facebook.

Today, we thought we would take a few minutes to review the goings on in the social media and messaging space.

Consolidating Facebook 

Back in December, the Federal Trade Commission (FTC) filed a lawsuit in federal court against Facebook, claiming that the social media giant has been engaged in anticompetitive conduct and violated antitrust laws. The attorneys general of 46 states, the District of Columbia, and Guam all cooperated with the FTC in an investigation that states Facebook has been engaged in unethical business by acquiring and running would-be competitor apps WhatsApp and Instagram. Facebook’s actions are being scrutinized as they begin to consolidate the management of data throughout their family of apps. 

Facebook is also accused of restricting third-party software developers from accessing Facebook’s development platform unless they signed legal agreements to only create applications that don’t directly compete with Facebook’s properties. 

Smaller Messaging Apps Thrive

With WhatsApp’s recent announcement that all data sent and received on the application will effectively be considered a part of that person’s Facebook profile, a lot of users are looking to change to emerging messaging applications to avoid the security and privacy concerns. Two options include Signal and Telegram. These two options have seen massive growth. Signal has gained 7.5 million new users in a week’s time, while Telegram became the most downloaded app in the United States, adding 9 million new users.

With WhatsApp now requiring users to share phone numbers, locations, and contacts’ phone numbers with Facebook and its subsidiaries, there is concern about user’s privacy. Facebook has stated that the new privacy policies do not affect messages shared between family or friends, only those messages sent to a business. That fact is largely lost on people who seem to finally be getting a handle on how important their data privacy really is. 

What do you think? Do you agree with Facebook’s move to consolidate their data collection, or do you think that data privacy is too important for such a powerful company to make these drastic moves? Leave your thoughts in the comments below.

How You Can Use Workflow Automation to Make the Of...
Helpful Features Found in Google Docs

By accepting you will be accessing a service provided by a third-party external to https://frspros.com/

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Hackers Internet Software Google User Tips Innovation Efficiency Cloud Hardware Workplace Tips Microsoft Data Email Communication Business Smartphones Hosted Solutions Small Business Business Management Computer Mobile Devices IT Support Cybersecurity Android Data Backup Windows 10 Collaboration Backup Malware Tech Term IT Services Disaster Recovery VoIP Browser Phishing Smartphone Users Upgrade Data Recovery Gadgets Windows Outsourced IT Office 365 Miscellaneous Communications Internet of Things Ransomware Quick Tips Apps Information Network Mobile Device Covid-19 Cloud Computing Data Security Social Media Cybercrime Business Continuity Saving Money Managed Service Automation Passwords Managed IT Services Health Operating System Microsoft Office Facebook Blockchain Wireless Mobile Device Management Money Holiday Artificial Intelligence Information Technology Alert OneNote Conferencing Law Enforcement Save Money Employer-Employee Relationship Two-factor Authentication Server Vulnerability Best Practice Managed IT Services Networking Wi-Fi IT Support Managed IT Applications Virtualization Printing Spam Chrome Mobile Office Telephone Systems Tech Support Data Storage Retail Risk Management WiFi Remote Workers Windows 7 Password Word Project Management Patch Management Hacking Managed Service Provider Windows 10 BDR Gmail Bandwidth Data Breach BYOD Router Computers Unsupported Software Augmented Reality App Google Drive Settings Paperless Office Access Control Bring Your Own Device Remote Battery Vendor HIPAA User Error Instant Messaging Google Assistant Productivity Hybrid Cloud Touchscreen Sports Going Green Social Cortana Voice over Internet Protocol Government Wireless Internet Data Loss Telephony Robot Business Technology Audit Update The Internet of Things Google Docs Shortcut Software as a Service Data Protection Wireless Charging Politics Meetings Devices Hard Drive Display VPN iPhone Human Resources YouTube IT Management History Cost Management Payment Cards Marketing Commerce WannaCry Travel Budget File Sharing Application Hosted Solution Excel Management Apple Fraud Encryption Avoiding Downtime Mobility Wireless Technology Search Safety Sales Mobile Security Training Data Management SaaS Proactive IT Smartwatch Evernote Processor Regulations Compliance Edge Hacker Compliance Break/Fix IT solutions Hosted Desktop FAQ Hyperlink Emergency Machine Learning Access Touchpad Fiber Optics Websites Identity Printers Development Telework NFL eWaste Saving Time Chromecast Innovations Identities Point of Sale Employee-Employer Relationship iOS WIndows Server 2008 Server Maintenance Remote Work Benchmarks End of Support Policy Ciminal Keyboard Medical IT Windows 10s HBO Smart Devices Charger Entertainment Value Wasting Time Amazon Downtime Internet Exlporer Screen Mirroring Humor Holidays Data Theft Identity Theft Data Privacy Computer Care Nanotechnology Micrsosoft Audits Device Security Gamification Keyboard Shortcuts Unified Threat Management Managed IT Service Remote Working Legislation Language Office Investment Net Neutrality Adobe Workers Myths Procedure 5G Uninterrupted Power Supply Solid State Drive Sabotage Troubleshooting Personal Information Accessory Windows Ink Virtual Assistant E-Commerce Emails Cast Copiers Gifts Computing Vendor Management Root Cause Analysis Business Intelligence Solutions Memory Upgrades Managed Services Provider Reviews Comparison Scam Testing Computer Fan ROI Reputation Internet Service Provider Licensing Updates Data storage Threats Video Conferencing Microsoft Excel IT budget Education Hard Disk Drive PC CRM Outlook Computer Forensics Peripheral Google Maps Spyware Alexa for Business DDoS Inventory Credit Cards App store Samsung Chromebook Co-Managed Services Files Remote Computing Digital Signage Printer Financial Payroll Recovery Facebook Privacy Managed Services Specifications Virus Camera Disaster Windows Server 2008 R2 Microsoft Word Scams Organization Employees IT Solutions AI Legal Employee Webinar Antivirus Telephone Firewall PCI DSS Security Cameras Consultant Administrator Laptop eCommerce Biometrics Proactive Projects Transportation Workstation Tablets Maintenance Streaming Media Remote Monitoring Virtual Private Network Storage Social Engineering OneDrive Lithium-ion battery Private Cloud Sync PowerPoint Admin Thank You Television CrashOverride Company Culture Scalability Analytics Regulation Congratulations HaaS Black Market Cleaning Relocation Automobile Big Data Managing Stress Twitter USB Worker PDF How To Books Hiring/Firing Mobile Computing Video Games Experience Virtual Reality Work/Life Balance Text Messaging Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Cache Benefits es Phone System Save Time Communitications Office tips Computer Accessories Monitors Advertising Smart Technology Flexibility Music