{"id":911,"date":"2020-04-17T19:05:48","date_gmt":"2020-04-18T02:05:48","guid":{"rendered":"https:\/\/blogs.ubc.ca\/technut\/?p=911"},"modified":"2020-04-17T19:05:48","modified_gmt":"2020-04-18T02:05:48","slug":"risks-of-third-party-apps-you-probably-didnt-think-about","status":"publish","type":"post","link":"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/","title":{"rendered":"Risks of Third-party Apps You Probably Didn&#8217;t Think About"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-912 aligncenter\" src=\"https:\/\/blogs.ubc.ca\/technut\/files\/2020\/04\/gsuite-1024x680.jpg\" alt=\"\" width=\"700\" height=\"465\" \/><\/p>\n<p><span style=\"font-weight: 400;\">An app for this, an app for that.\u00a0 It seems in this day and age, there is an \u201capp\u201d for just about anything you want to do or accomplish.\u00a0 We certainly live in an app-filled world. If previous decades were the age of infrastructure, we are now in the age of applications.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Applications are key to business processes and productivity today.\u00a0 Most organizations run on top of an application stack that allows carrying out many key business functions.\u00a0 Now, most organizations are leveraging the public cloud and cloud-based applications for even more powerful collaboration and technology-driven processes.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Software-as-a-Service (SaaS) environments like G Suite and Office 365 are extremely popular among organizations to host business collaboration, file sharing, email and other services.\u00a0 Cloud SaaS environments today contain a large number of third-party apps that can easily be integrated into your environment. While there can be benefits to these third-party applications, let\u2019s talk about the risks of third-party apps you didn\u2019t know about.\u00a0\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What are Third-Party Apps?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">First of all, what are the <\/span><b>third-party<\/b><span style=\"font-weight: 400;\"> apps we are referring to when thinking about potential risks to your environment?\u00a0 Third-party \u201capps\u201d are readily available in both Google\u2019s G Suite and Microsoft\u2019s Office 365 environments. There are third-party apps available covering a wide range of functionality for your SaaS users.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An example of available third-party application categories include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Remote video conference tools<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Business Tools<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Office applications<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Accounting &amp; finance<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Administration &amp; management<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">ERP &amp; Logistics<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">HR &amp; Legal<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Marketing &amp; analytics<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Sales &amp; CRM<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Creative tools<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Web development<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Task management\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The beauty of third-party apps in regards to cloud SaaS environments like G Suite or Office 365 is that if you have any gaps in the native cloud SaaS tools offered, you can most certainly find a third-party app that provides the functionality you need.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Third-party apps augment the capabilities of SaaS environments with even more robust tooling, features, and capabilities.\u00a0 These applications generally follow the same SaaS license model of a \u201cper user\u201d license. By means of the third-party apps offered in cloud SaaS marketplaces, your organization can have an \u201cala carte\u201d style menu available to pick and choose the apps to satisfy the business functionality needed.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Below is an example of the <\/span><b>G Suite Marketplace<\/b><span style=\"font-weight: 400;\"> where users have an almost unlimited selection of applications to chose from.\u00a0 By default, users can search and install applications using their G Suite user accounts.\u00a0 You can browse by application type, or applications can be found by searching for apps by name.\u00a0 <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In today\u2019s mobile-driven world, third-party apps have become a staple of how we interact with services and data.\u00a0 It has also become an extremely important part of the public cloud. Despite the functionality provided by robust third-party apps, they can bring risks to your organization.\u00a0 How is this the case?<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Risks of third-party apps you probably didn\u2019t think about<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Despite their numerous benefits, third-party apps can certainly bring risk to your organization data, compliance, and security.\u00a0 Let\u2019s take a look at the potential risks that are presented by the use of third-party apps in your cloud SaaS environment.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>1. Malware including ransomware<\/b><\/p>\n<p><b>2. Data-leak concerns<\/b><\/p>\n<p><span style=\"font-weight: bold;\">3. Compliance and regulatory violations<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Often, these particular risks of third-party apps go unnoticed by organizations who are making use of cloud SaaS environments.\u00a0 Let\u2019s explore these further and see why and how your organization can give attention to these specific third-party app risks.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Malware including ransomware<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">There is arguably no greater risk to your business-critical data today than <\/span><b>ransomware<\/b><span style=\"font-weight: 400;\">.\u00a0 Ransomware insidiously and silently encrypts your data so that you can no longer access what is rightfully yours.\u00a0 Once the encryption process has locked you out of your data, a ransom demand appears, demanding payment before access is restored.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While many have incorrectly assumed that ransomware is an on-premises problem only, this can lead to dangerous consequences for data stored in public cloud storage.\u00a0 Many organizations today are migrating business-critical services like email and file storage to cloud SaaS environments. Without an understanding of the risks at play with third-party apps integrating with cloud SaaS, data can easily be affected.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ransomware can easily propagate to cloud SaaS environments by means of <\/span><b>file synchronization<\/b><span style=\"font-weight: 400;\"> as well as <\/span><b>malicious third-party apps<\/b><span style=\"font-weight: 400;\"> and <\/span><b>browser extensions<\/b><span style=\"font-weight: 400;\"> that gain access to cloud data.\u00a0 New ransomware variants affecting environments today are \u201ccloud-aware\u201d and are able to compromise cloud SaaS environments by means of these malicious applications.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cRansomcloud\u201d attacks <\/span><span style=\"font-weight: 400;\">show how easily a malicious application<\/span><span style=\"font-weight: 400;\"> granted permissions in cloud environments can totally compromise your data.\u00a0 As demonstrated in the \u201cransomcloud\u201d attack, an entire user\u2019s mailbox is encrypted by granting permissions to a seemingly benign application that in all actuality is ransomware in disguise.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This proof of concept demonstrates the dangers of third-party applications that are granted access to your cloud SaaS environments, either intentionally or by accident.\u00a0 Ransomware attacks can propagate by means of a malicious application or even a browser plugin that has the permissions needed to start encrypting your data. How can malicious third-party apps and browser plugins obtain this level of access to your business-critical data stored in G Suite or Office 365 storage?<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">End users easily grant permissions<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Risky or malicious third-party apps often gain easy access to cloud SaaS environments like G Suite or Office 365 by means of end user-granted permissions.\u00a0 Public cloud vendors use an OAuth 2.0 token technology to allow end users to grant access to their data without the need for a password to do so. All the end user has to do is <\/span><b>grant permissions<\/b><span style=\"font-weight: 400;\"> to a permissions request coming from a third-party app.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All of us are guilty of blindly granting permissions to apps that request them during installation.\u00a0 How many of us actually read the details of the permissions requested by third-party applications we install on our mobile devices?\u00a0 Think about an end user with either a company-issued mobile device, or a personal device used to also access company data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If an end user blindly accepts permissions while installing a risky third-party app and the end user\u2019s phone is connected to your organization\u2019s data, all business-critical or sensitive data the end user has access to is now at risk of compromise by a risky third-party app.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The same is true for <\/span><b>browser extensions<\/b><span style=\"font-weight: 400;\">.\u00a0 Third-party browser extensions can request the same types of permissions to cloud data as other third-party applications that are installed via mobile devices.\u00a0 A <\/span><a href=\"https:\/\/www.zdnet.com\/article\/a-third-of-all-chrome-extensions-request-access-to-user-data-on-any-site\/\"><span style=\"font-weight: 400;\">recent study <\/span><\/a><span style=\"font-weight: 400;\">found that <\/span><span style=\"font-weight: 400;\">more than a third of all Google Chrome extensions ask users for permission to access and read all their data on any website<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When you think about the possible security implications of third-party apps installed on mobile devices as well as third-party browser extensions, it is imperative to have visibility to and the ability to block these dangers.\u00a0 This requires controlling <\/span><b>which applications<\/b><span style=\"font-weight: 400;\"> are installed in your cloud SaaS environments.\u00a0\u00a0<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">Data leak concerns<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Aside from an all-out ransomware attack on your organization\u2019s data, there is another scary cybersecurity concern that should get the attention of businesses everywhere \u2013 <\/span><b>data leak<\/b><span style=\"font-weight: 400;\">.\u00a0 Next, to ransomware data leak should be extremely concerning to your business.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With data leak, confidential or otherwise sensitive data is \u201cleaked\u201d outside the \u201cwalls\u201d of your organization and disclosed to the outside world.\u00a0 Many businesses deal with confidential data by its nature. You may think of <\/span><b>Electronic Medical Records (EMR)<\/b><span style=\"font-weight: 400;\"> information processed by hospitals and other healthcare organizations or <\/span><b>financial data<\/b><span style=\"font-weight: 400;\"> that is housed by banking institutions and other financial organizations.\u00a0 There are many different sources of confidential and other sensitive data that you would never want to leak outside the realms of sanctioned use.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While you may have restrictions in place on who has access to sensitive types of data that exist inside cloud environments, what about the applications that have access to this data?\u00a0 Think of a scenario with a seemingly legitimate widget application that is downloaded for use on an Android device. The end user who installs the Android widget application also has high-level access to sensitive and confidential data stored in your organization\u2019s cloud SaaS environment.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even though the application requests extremely high-level device permissions such as the following, the user simply grants all permissions to the new widget app:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Read your text messages (SMS or MMS)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Full Network Access<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Read phone status and identity<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Modify or delete the contents of your device storage<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The widget application now has a high level of access to both the network and storage of the device.\u00a0 The seemingly legitimate third-party app is actually malicious in nature and starts reading and copying data synchronized with your cloud SaaS environment to a dark web repository defined by the attacker.\u00a0 What can this cost your business?\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The cost of<\/span><b> data breach<\/b><span style=\"font-weight: 400;\"> can be significant as outlined by IBM\u2019s \u201c<\/span><a href=\"https:\/\/www.ibm.com\/security\/data-breach\"><span style=\"font-weight: 400;\">The Cost of a Data Breach Report 2019<\/span><\/a><span style=\"font-weight: 400;\">\u201d.\u00a0 According to the yearly report by IBM\u2019s research team, in 2019, the cost of a data breach included the following eye-opening statistics:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Average total cost of a data breach &#8211; <\/span><b>$3.92 million<\/b><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Most expensive country \u2013 <\/span><b>United States, $8.19 million<\/b><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Most expensive industry \u2013 <\/span><b>Healthcare, $6.45 million<\/b><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Average size of a data breach \u2013 <\/span><b>25,575 records<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Keep in mind these are average statistics and may cost your business even more according to the degree and effectiveness of cybersecurity responses you have in place.\u00a0 It helps to underscore the tremendous responsibility of your organization when it comes to limiting the exposure of your data to third-party applications.\u00a0\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Compliance and regulatory violations<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">There is another aspect for businesses today to consider when it comes to keeping data safe and out of the wrong hands \u2013 <\/span><b>compliance and regulatory<\/b><span style=\"font-weight: 400;\">.\u00a0 Compliance and regulatory frameworks are designed to protect customer and other sensitive data.\u00a0 Compliance regulations provide a framework of standards that, when followed by organizations, helps to ensure the proper security and other fail safes are put in place to protect important types of data.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Compliance and regulatory frameworks are a good thing for both your business as well as your customer information.\u00a0 It serves to protect both from negative consequences of data breach. However, today\u2019s compliance and regulatory frameworks can also levy huge fines if your organization is found in violation of or grossly negligent to the point where customer data is compromised.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A great example of this the <\/span><b>General Data Protection Regulation (GDPR)<\/b><span style=\"font-weight: 400;\"> that went into effect May, 2018.\u00a0 GDPR is not only a recommendation, it is required for those who \u201ctouch\u201d data of any European citizen.\u00a0 The fines and consequences for those organizations found in violation of GDPR guidelines can be tremendous.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As <\/span><a href=\"https:\/\/gdpr-info.eu\/issues\/fines-penalties\/\"><span style=\"font-weight: 400;\">noted here<\/span><\/a><span style=\"font-weight: 400;\">, fines can include:<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">\u201cFor especially severe violations, listed in Art. 83(5) GDPR, the fine framework can be up to 20 million euros, or in the case of an undertaking, up to 4 % of their total global turnover of the preceding fiscal year, whichever is higher. But even the catalogue of less severe violations in Art. 83(4) GDPR sets forth fines of up to 10 million euros, or, in the case of an undertaking, up to 2% of its entire global turnover of the preceding fiscal year, whichever is higher.\u201d<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Under the GDPR guidelines, it is extremely important that organizations take seriously their responsibility to provide <\/span><b>data security<\/b><span style=\"font-weight: 400;\">.\u00a0 The overall import of the GDPR data protection framework is <\/span><b>data protection by design and by default<\/b><span style=\"font-weight: 400;\">.\u00a0 A portion of the <\/span><a href=\"https:\/\/gdpr.eu\/checklist\/\"><span style=\"font-weight: 400;\">GDPR checklist<\/span><\/a><span style=\"font-weight: 400;\"> helps to highlight this as organizations are expected to ensure the following:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Take data protection into account at all times, from the moment you begin developing a product to each time you process data<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Encrypt, pseudonymize, or anonymize personal data wherever possible<\/span><\/li>\n<li><b>Create an internal security policy for your team members, and build awareness about data protection<\/b><\/li>\n<li><span style=\"font-weight: 400;\">Know when to conduct a data protection impact assessment, and have a process in place to carry it out<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Have a process in place to notify the authorities and your data subjects in the event of a data breach<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The walkthrough in the <\/span><b>data leak <\/b><span style=\"font-weight: 400;\">example demonstrates how easy it is for a malicious third-party application that is granted permissions by an end user to access sensitive data.\u00a0 It also demonstrates how easy it would be for an organization to be in violation of compliance regulations like GDPR when customer data is exposed without safeguards in place.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Taking into consideration the threat and risks of malicious or \u201cleaky\u201d third-party applications and browser plugins must be part of the <\/span><b>design<\/b><span style=\"font-weight: 400;\"> when it comes to housing your business-critical data in cloud SaaS environments.\u00a0\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Eliminate Third-Party App Risks<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">To effectively eliminate the risks of third-party apps to your business-critical and sensitive data, you need both <\/span><b>visibility<\/b><span style=\"font-weight: 400;\"> and <\/span><b>control<\/b><span style=\"font-weight: 400;\">.\u00a0 First of all, you need visibility to any potential risks in your organization.\u00a0 Cloud SaaS data security can be challenging for organizations who are accustomed to on-premises environments and who lack the tooling needed to monitor data access properly in the cloud.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Controlling access to data can also be challenging without the right toolsets since data can be accessed from many different kinds of devices and networks.\u00a0 How can your organization effectively monitor and manage data access and protect the environment from risky third-party applications accessing your cloud data?\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The sheer complexity of today\u2019s environments spanning both on-premises and public cloud locations and the enormity of attack vectors require you use an automated approach to both detect and remediate threats effectively.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An ideal SaaS data protection platform should have an automated <\/span><b>sentinel<\/b><span style=\"font-weight: 400;\"> that guards your cloud SaaS environment 24x7x365. You can also utilise an API-based Cloud Access Security Broker (CASB) that integrates to provide <\/span><a href=\"https:\/\/spinbackup.com\/products\/gsuite-security\/\"><span style=\"font-weight: 400;\">Google Apps Security<\/span><\/a><span style=\"font-weight: 400;\"> or protect your Office 365 environment.\u00a0 It provides you with the tools you need to have both the <\/span><b>visibility<\/b><span style=\"font-weight: 400;\"> and <\/span><b>control<\/b><span style=\"font-weight: 400;\"> over third-party applications in your environment.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Protection against risky third-party apps as well as other cybersecurity threats to your business is critical.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Be sure to choose the best protection platform for your cloud environment.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An app for this, an app for that.\u00a0 It seems in this day and age, there is an \u201capp\u201d for just about anything you want to do or accomplish.\u00a0 We certainly live in an app-filled world. If previous decades were the age of infrastructure, we are now in the age of applications. Applications are key [&hellip;]<\/p>\n","protected":false},"author":48857,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[483,4964],"tags":[],"class_list":["post-911","post","type-post","status-publish","format-standard","hentry","category-business","category-tech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Risks of Third-party Apps You Probably Didn&#039;t Think About - TechNut<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risks of Third-party Apps You Probably Didn&#039;t Think About - TechNut\" \/>\n<meta property=\"og:description\" content=\"An app for this, an app for that.\u00a0 It seems in this day and age, there is an \u201capp\u201d for just about anything you want to do or accomplish.\u00a0 We certainly live in an app-filled world. If previous decades were the age of infrastructure, we are now in the age of applications. Applications are key [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/\" \/>\n<meta property=\"og:site_name\" content=\"TechNut\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-18T02:05:48+00:00\" \/>\n<meta name=\"author\" content=\"TechNut\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TechNut\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/2020\\\/04\\\/17\\\/risks-of-third-party-apps-you-probably-didnt-think-about\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/2020\\\/04\\\/17\\\/risks-of-third-party-apps-you-probably-didnt-think-about\\\/\"},\"author\":{\"name\":\"TechNut\",\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/#\\\/schema\\\/person\\\/0baab1f46b449984ba3a1d46459170fc\"},\"headline\":\"Risks of Third-party Apps You Probably Didn&#8217;t Think About\",\"datePublished\":\"2020-04-18T02:05:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/2020\\\/04\\\/17\\\/risks-of-third-party-apps-you-probably-didnt-think-about\\\/\"},\"wordCount\":2313,\"image\":{\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/2020\\\/04\\\/17\\\/risks-of-third-party-apps-you-probably-didnt-think-about\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/files\\\/2020\\\/04\\\/gsuite-1024x680.jpg\",\"articleSection\":[\"Business\",\"Tech\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/2020\\\/04\\\/17\\\/risks-of-third-party-apps-you-probably-didnt-think-about\\\/\",\"url\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/2020\\\/04\\\/17\\\/risks-of-third-party-apps-you-probably-didnt-think-about\\\/\",\"name\":\"Risks of Third-party Apps You Probably Didn't Think About - TechNut\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/2020\\\/04\\\/17\\\/risks-of-third-party-apps-you-probably-didnt-think-about\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/2020\\\/04\\\/17\\\/risks-of-third-party-apps-you-probably-didnt-think-about\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/files\\\/2020\\\/04\\\/gsuite-1024x680.jpg\",\"datePublished\":\"2020-04-18T02:05:48+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/#\\\/schema\\\/person\\\/0baab1f46b449984ba3a1d46459170fc\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/2020\\\/04\\\/17\\\/risks-of-third-party-apps-you-probably-didnt-think-about\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/2020\\\/04\\\/17\\\/risks-of-third-party-apps-you-probably-didnt-think-about\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/2020\\\/04\\\/17\\\/risks-of-third-party-apps-you-probably-didnt-think-about\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/2020\\\/04\\\/17\\\/risks-of-third-party-apps-you-probably-didnt-think-about\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risks of Third-party Apps You Probably Didn&#8217;t Think About\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/#website\",\"url\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/\",\"name\":\"TechNut\",\"description\":\"Global business and technology news, written by the UBC community\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/#\\\/schema\\\/person\\\/0baab1f46b449984ba3a1d46459170fc\",\"name\":\"TechNut\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/60410d1ef2b265d458651183a6ac74b3725d81b1e36cec291d367b32f43af3c0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/60410d1ef2b265d458651183a6ac74b3725d81b1e36cec291d367b32f43af3c0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/60410d1ef2b265d458651183a6ac74b3725d81b1e36cec291d367b32f43af3c0?s=96&d=mm&r=g\",\"caption\":\"TechNut\"},\"url\":\"https:\\\/\\\/blogs.ubc.ca\\\/technut\\\/author\\\/man-luu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Risks of Third-party Apps You Probably Didn't Think About - TechNut","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/","og_locale":"en_US","og_type":"article","og_title":"Risks of Third-party Apps You Probably Didn't Think About - TechNut","og_description":"An app for this, an app for that.\u00a0 It seems in this day and age, there is an \u201capp\u201d for just about anything you want to do or accomplish.\u00a0 We certainly live in an app-filled world. If previous decades were the age of infrastructure, we are now in the age of applications. Applications are key [&hellip;]","og_url":"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/","og_site_name":"TechNut","article_published_time":"2020-04-18T02:05:48+00:00","author":"TechNut","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TechNut","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/#article","isPartOf":{"@id":"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/"},"author":{"name":"TechNut","@id":"https:\/\/blogs.ubc.ca\/technut\/#\/schema\/person\/0baab1f46b449984ba3a1d46459170fc"},"headline":"Risks of Third-party Apps You Probably Didn&#8217;t Think About","datePublished":"2020-04-18T02:05:48+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/"},"wordCount":2313,"image":{"@id":"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.ubc.ca\/technut\/files\/2020\/04\/gsuite-1024x680.jpg","articleSection":["Business","Tech"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/","url":"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/","name":"Risks of Third-party Apps You Probably Didn't Think About - TechNut","isPartOf":{"@id":"https:\/\/blogs.ubc.ca\/technut\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/#primaryimage"},"image":{"@id":"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.ubc.ca\/technut\/files\/2020\/04\/gsuite-1024x680.jpg","datePublished":"2020-04-18T02:05:48+00:00","author":{"@id":"https:\/\/blogs.ubc.ca\/technut\/#\/schema\/person\/0baab1f46b449984ba3a1d46459170fc"},"breadcrumb":{"@id":"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.ubc.ca\/technut\/2020\/04\/17\/risks-of-third-party-apps-you-probably-didnt-think-about\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.ubc.ca\/technut\/"},{"@type":"ListItem","position":2,"name":"Risks of Third-party Apps You Probably Didn&#8217;t Think About"}]},{"@type":"WebSite","@id":"https:\/\/blogs.ubc.ca\/technut\/#website","url":"https:\/\/blogs.ubc.ca\/technut\/","name":"TechNut","description":"Global business and technology news, written by the UBC community","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.ubc.ca\/technut\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogs.ubc.ca\/technut\/#\/schema\/person\/0baab1f46b449984ba3a1d46459170fc","name":"TechNut","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/60410d1ef2b265d458651183a6ac74b3725d81b1e36cec291d367b32f43af3c0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/60410d1ef2b265d458651183a6ac74b3725d81b1e36cec291d367b32f43af3c0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/60410d1ef2b265d458651183a6ac74b3725d81b1e36cec291d367b32f43af3c0?s=96&d=mm&r=g","caption":"TechNut"},"url":"https:\/\/blogs.ubc.ca\/technut\/author\/man-luu\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.ubc.ca\/technut\/wp-json\/wp\/v2\/posts\/911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ubc.ca\/technut\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ubc.ca\/technut\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ubc.ca\/technut\/wp-json\/wp\/v2\/users\/48857"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ubc.ca\/technut\/wp-json\/wp\/v2\/comments?post=911"}],"version-history":[{"count":1,"href":"https:\/\/blogs.ubc.ca\/technut\/wp-json\/wp\/v2\/posts\/911\/revisions"}],"predecessor-version":[{"id":913,"href":"https:\/\/blogs.ubc.ca\/technut\/wp-json\/wp\/v2\/posts\/911\/revisions\/913"}],"wp:attachment":[{"href":"https:\/\/blogs.ubc.ca\/technut\/wp-json\/wp\/v2\/media?parent=911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ubc.ca\/technut\/wp-json\/wp\/v2\/categories?post=911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ubc.ca\/technut\/wp-json\/wp\/v2\/tags?post=911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}