{"id":98384,"date":"2023-09-13T14:20:47","date_gmt":"2023-09-13T18:20:47","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=98384"},"modified":"2023-09-13T14:20:48","modified_gmt":"2023-09-13T18:20:48","slug":"temu-malware-byod","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/temu-malware-byod","title":{"rendered":"TEMU May Be Watching. Are You?"},"content":{"rendered":"\n

CNBC recently reported<\/a> that TEMU, an online shopping app with trendy items for sale at tantalizingly low prices, silently installs spyware onto devices once downloaded. According to Grizzly, the firm that performed this analysis, it\u2019s undetectable by conventional measures, so your traditional antivirus software likely won\u2019t catch it. It runs in the background, mining any data you keep on your device.<\/p>\n\n\n\n

Whether this is true or not, the idea that popular consumer-based apps could contain additional software like this raises security concerns \u2014 not just to individual users, but also to companies whose employees access company resources with personal devices. As the world becomes more digital and hybrid, personal devices in the workplaces are almost a given. <\/p>\n\n\n\n

So, how can companies protect themselves? <\/p>\n\n\n\n

The Massive Risk to Companies <\/h2>\n\n\n\n

We do a lot on our phones. We log into accounts, buy things, check our bank accounts, access patient portals\u2026 the list goes on. If spyware makes it on to your phone, all of that data is at risk of being mined, sold, and compromised. <\/p>\n\n\n\n

Personal data theft isn\u2019t the only risk, though. As personal devices become more prevalent in the workplace, spyware could infiltrate company information as well. Even if employees are only using their device to log into their company email, the spyware could catch their company email address, password, company contacts, and potentially sensitive email contents. That\u2019s a lot of data.<\/p>\n\n\n\n

And this isn\u2019t the only allegation out there. Tik Tok, for example, has often been in the spotlight for suspicions of data theft<\/a>. In fact, several countries have banned Tik Tok<\/a> from official devices in government institutions.\u00a0<\/p>\n\n\n\n

The fact is that personal device use is expanding, and malware is exploiting this trend with increasingly sophisticated and predatory tactics. <\/p>\n\n\n\n

How Can You Protect Company Data?<\/h2>\n\n\n\n

It can be tempting to put a ban on anything and everything suspicious. And for company-managed devices, this may be feasible. However, companies are limited in their ability to restrict what goes on personal devices. This can create a massive security gap.<\/p>\n\n\n\n

So, how can companies protect themselves?<\/p>\n\n\n\n

At JumpCloud, we\u2019re fans of the \u201copt-in\u201d approach to BYOD devices in the workplace. That is, if employees decide they want to use their personal devices for work, they must opt into the company\u2019s BYOD program and abide by its policies. In this model, employees are also welcome to opt out. By doing so, they agree not to access any company resources or data with their personal device, which remains unrestricted.\u00a0<\/p>\n\n\n\n

Learn how to create a secure BYOD policy in our blog, BYOD Best Practices<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"

What does TEMU’s alleged spyware teach us about securing devices in the workplace?<\/p>\n","protected":false},"author":144,"featured_media":98388,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[2458],"collection":[2778],"platform":[2365],"funnel_stage":[3016],"coauthors":[2532],"acf":[],"yoast_head":"\nTEMU May Be Watching. Are You? - JumpCloud<\/title>\n<meta name=\"description\" content=\"What does TEMU's alleged spyware teach us about securing devices in the workplace?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/temu-malware-byod\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TEMU May Be Watching. Are You?\" \/>\n<meta property=\"og:description\" content=\"What does TEMU's alleged spyware teach us about securing devices in the workplace?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/temu-malware-byod\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-13T18:20:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-13T18:20:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/temu-app-risks-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1443\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kate Lake\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kate Lake\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/temu-malware-byod#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/temu-malware-byod\"},\"author\":{\"name\":\"Kate Lake\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78\"},\"headline\":\"TEMU May Be Watching. Are You?\",\"datePublished\":\"2023-09-13T18:20:47+00:00\",\"dateModified\":\"2023-09-13T18:20:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/temu-malware-byod\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/temu-malware-byod#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/temu-app-risks-scaled.jpg\",\"keywords\":[\"BYOD\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/temu-malware-byod\",\"url\":\"https:\/\/jumpcloud.com\/blog\/temu-malware-byod\",\"name\":\"TEMU May Be Watching. Are You? - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/temu-malware-byod#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/temu-malware-byod#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/temu-app-risks-scaled.jpg\",\"datePublished\":\"2023-09-13T18:20:47+00:00\",\"dateModified\":\"2023-09-13T18:20:48+00:00\",\"description\":\"What does TEMU's alleged spyware teach us about securing devices in the workplace?\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/temu-malware-byod#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/temu-malware-byod\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/temu-malware-byod#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/temu-app-risks-scaled.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/temu-app-risks-scaled.jpg\",\"width\":2560,\"height\":1443,\"caption\":\"TEMU may install spyware on devices when downloaded.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/temu-malware-byod#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TEMU May Be Watching. Are You?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78\",\"name\":\"Kate Lake\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/46cab796831a4f3fb686940689408879\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g\",\"caption\":\"Kate Lake\"},\"description\":\"Kate Lake is a Senior Content Writer at JumpCloud, where she writes about JumpCloud\u2019s cloud directory platform and trends in IT, technology, and security. She holds a Bachelors in Linguistics from the University of Virginia and is driven by a lifelong passion for writing and learning. When she isn't writing for JumpCloud, Kate can be found traveling, exploring the outdoors, or quoting a sci-fi movie (often all at once).\",\"sameAs\":[\"https:\/\/jumpcloud.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"TEMU May Be Watching. Are You? - JumpCloud","description":"What does TEMU's alleged spyware teach us about securing devices in the workplace?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/temu-malware-byod","og_locale":"en_US","og_type":"article","og_title":"TEMU May Be Watching. Are You?","og_description":"What does TEMU's alleged spyware teach us about securing devices in the workplace?","og_url":"https:\/\/jumpcloud.com\/blog\/temu-malware-byod","og_site_name":"JumpCloud","article_published_time":"2023-09-13T18:20:47+00:00","article_modified_time":"2023-09-13T18:20:48+00:00","og_image":[{"width":2560,"height":1443,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/temu-app-risks-scaled.jpg","type":"image\/jpeg"}],"author":"Kate Lake","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kate Lake","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/temu-malware-byod#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/temu-malware-byod"},"author":{"name":"Kate Lake","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78"},"headline":"TEMU May Be Watching. Are You?","datePublished":"2023-09-13T18:20:47+00:00","dateModified":"2023-09-13T18:20:48+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/temu-malware-byod"},"wordCount":447,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/temu-malware-byod#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/temu-app-risks-scaled.jpg","keywords":["BYOD"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/temu-malware-byod","url":"https:\/\/jumpcloud.com\/blog\/temu-malware-byod","name":"TEMU May Be Watching. Are You? - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/temu-malware-byod#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/temu-malware-byod#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/temu-app-risks-scaled.jpg","datePublished":"2023-09-13T18:20:47+00:00","dateModified":"2023-09-13T18:20:48+00:00","description":"What does TEMU's alleged spyware teach us about securing devices in the workplace?","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/temu-malware-byod#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/temu-malware-byod"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/temu-malware-byod#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/temu-app-risks-scaled.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/temu-app-risks-scaled.jpg","width":2560,"height":1443,"caption":"TEMU may install spyware on devices when downloaded."},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/temu-malware-byod#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"TEMU May Be Watching. Are You?"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78","name":"Kate Lake","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/46cab796831a4f3fb686940689408879","url":"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g","caption":"Kate Lake"},"description":"Kate Lake is a Senior Content Writer at JumpCloud, where she writes about JumpCloud\u2019s cloud directory platform and trends in IT, technology, and security. She holds a Bachelors in Linguistics from the University of Virginia and is driven by a lifelong passion for writing and learning. When she isn't writing for JumpCloud, Kate can be found traveling, exploring the outdoors, or quoting a sci-fi movie (often all at once).","sameAs":["https:\/\/jumpcloud.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/98384"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/144"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=98384"}],"version-history":[{"count":3,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/98384\/revisions"}],"predecessor-version":[{"id":98395,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/98384\/revisions\/98395"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/98388"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=98384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=98384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=98384"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=98384"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=98384"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=98384"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=98384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}