Are Your Apps Broadcasting Your Exact Location?

Are Your Apps Broadcasting Your Exact Location?

Mobile devices have become a key part of our daily lives, to the point that many of us openly feel undressed without our phones. As a result, our phones go everywhere with us. However, it’s important to remember that some applications have requested access to our location information. Do all of these apps need to know precisely where we are?

No, not likely, and it’s important that we acknowledge what we are doing when we give these applications this kind of carte blanche access to specific location data.

How Precisely Do Your Apps Need to Know Your Location?

That all depends, primarily on what the purpose is. For instance, your map application of choice will only be effective if it can tell you where you are and where you are going, and how far away that is. This means it needs to know your precise location.

Can you say the same for your other applications, like your social media platforms, your shopping apps, or the apps that really have no need to know your location, but request access to it anyways?

(The answer is a resounding no, by the way.)

 This is what puts your privacy potentially at risk.

How to Control How Precisely Your Apps Can Track Your Location

Adjusting Location Permissions in Android:

Find the application you wish to adjust your privacy settings in, and tap and hold it to pull up the app menu. Access App Info > Permissions > All Permissions. Find Location and check that Approximate location is enabled and Precise location is disabled.

Adjusting Location Permissions in iOS:

Access your Settings, and from there, access Privacy > Location Services. From there, check that the Precise Location option is switched off.

Your Data is Valuable… Don’t Overshare It

It’s important that you keep your data safe, even from the services you rely on every day. We strongly recommend you go through your applications and review the permissions you’ve provided to them, adjusting them as needed.

White Mountain IT Services can similarly help you protect your business’ data through our managed services and proactive monitoring. Find out more by giving us a call at 603-889-0800.

Related Posts

Imagine this scenario: you’re going about your daily tasks when you receive an email from a cybersecurity company claiming that you have become the target of a hacking attack. Now, you don’t work in IT, so you’re not sure what your security agency is...
User authentication is a critical security feature for a business, specifically because it helps to minimize a significant threat to your business. This is why we’re so adamant that you should require multi-factor authentication wherever it is availa...
Chances are, you’ve gone through some old files and weeded through them, deleting what is no longer needed. This is especially important when you are upgrading your storage and getting rid of your existing storage media or an old computer. Let’s talk...
There is always the possibility that you have been involved with a data breach and you simply have not been contacted by the affected party. Plus, if a hacker has managed to crack a website or service without being detected, you wouldn’t be notified ...
Let’s begin by making one thing abundantly clear—all businesses and industries could potentially be targeted by ransomware, regardless of their size or target audience. However, as of late, some industries have been targeted more and more. Let’s exam...
Your business is your livelihood, so it only makes sense to invest in its protections so that your livelihood is secure. This will require a strategic approach. Let’s go over what your business needs to remain sufficiently secure, and what you should...
“Wait, I didn’t buy that!” That’s what many smartphone users have been saying lately, as a prevalent strain of malware has been infecting Android devices. The malware is called “toll fraud malware” and it’s been signing users up to services they don’...
We’ve been known to take a bit of an extreme approach to cybersecurity—your business is at constant threat of being attacked by all manners of threats and all that. While we stand by this approach as an effective way to boost awareness and adherence ...
Let’s get right to brass tacks. Your business is likely vulnerable to cybersecurity attacks. There are a whole lot of things you should be doing to protect your organization, but this one task is something you can do right now to save your business a...
Have you ever wondered how some platforms will only have you log in once for all of your various needs, even though they might be different applications, websites, or services? This is essentially what single sign-on is, and it’s quite common in the ...
Cloudflare has foiled the plans of yet another major hacking attack, a record-breaking DDoS attack of the likes we have never before seen. Let’s examine what goes into such an attack and what you can do to keep your business safe from their influence...
Considering what today’s cyberthreat environment looks like, more and more rigorous cybersecurity is strictly needed. One means that businesses have to accomplish this is a cybersecurity practice known as a zero-trust model. Let’s go over what zero-t...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our offices in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.


Onsite Computer Support Services are available to businesses within 60 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

White Mountain IT Services


33 Main St, Suite 302
Nashua, NH 03064


121 Riverfront Drive
Manchester, NH 03102


Client Help Desk


Open Positions