Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Which is More Secure, Your Mobile Network or Wi-Fi?

Which is More Secure, Your Mobile Network or Wi-Fi?

For the modern business, having a strategy to manage your employees smartphone use is essential. This is because most of the people that work for you have smartphones. One study shows that upwards of 90 percent of people under 30 own a smartphone. If you have any design on running a business, or employing millennials (who are the largest generation in the current workforce), you’ll need to know what you are doing to protect your business from the increasing amount of threats that are out there targeting smartphones.

An annual Wi-Fi Security Report conducted by Wandera found that, out of a sample of 100,000 corporate-owned mobile devices, 74% of wireless data was transferred using a Wi-Fi network, 12 percent of Wi-Fi hotspots used by those people are open and lacking encryption, and only four percent of these corporate-owned devices have been exposed to malware through an accidental or deliberate man-in-the-middle attack.

The man-in-the-middle attack (MiTM) is one where a computer will pick up malware that allows an intermediary to intercept files and correspondence between the two machines, and upon connecting to a network via a Wi-Fi connection, transfers the malware onto the computing network--thus infecting the network with the malware that allows the hacker to intercept any communication.

It’s largely understood that cellular networks are more secure than Wi-Fi networks, as cellular networks utilize high-end encryption techniques. This doesn’t make them popular, however. People will typically use Wi-Fi that is available. In fact, one statistic suggests that people are so addicted to the use of Wi-Fi that upwards of 60 percent of people will connect to any available public Wi-Fi rather than use the cellular data, even if they don’t pay for it themselves. Symantec’s Wi-Fi Risk Report corroborates this notion, adding that roughly the same number of people believe their personal information is more secure transmitted over Wi-Fi, and that 53 percent cannot tell the difference between a secure and unsecure Wi-Fi network. The report goes on to state that nearly nine out of ten consumers have put their information at risk by using public Wi-Fi.

At the business level things get a little better. While individual Wi-Fi use remains similar, businesses typically do a much better job of securing their network to keep malicious entities out. One way they do this is by setting up a firewall to keep their Wi-Fi networks away from the rest of their network. Typically, when a person accesses your organization’s Wi-Fi, they are then able to access your whole entire network. If your servers and other confidential data are linked to your organizational Wi-Fi, then an intruder who can manage to connect will then have access. By separating your Wi-Fi from your network behind a firewall, you will not only protect yourself from ambitiously malignant people on your network, but also go a long way toward safeguarding your network from cyber attacks in general.

Another way that the business can ensure their mobile strategy won’t hamstring their company’s network is by instituting a Virtual Private Network (VPN). The VPN brings additional encryption to data communication by creating a secure tunnel in which to transfer data. For the small business a VPN has become an almost essential part of providing your staff with a workable remote computing situation. Not only does it work to secure your business’ data while using available remote connections, it makes it easier to scale a business by allowing new systems to connect to it with minimal configuration. In doing so, the deployment of a strategic VPN reduces capital investment and is a major benefit for organizational mobility.

If you haven’t already, your business is going to have to address your mobile security before it gets burned. If you would like to learn more about what you are up against, or how you can utilize today’s security technology to protect your business’ important data, call Computerware today at (703) 821-8200.

Tip of the Week: Why You Should Reconsider Your Be...
These Gifts Can Come with Security Issues


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 20 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Hackers Software Business Computing Workplace Tips Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Small Business Gadgets Quick Tips Smartphones Network Security Business Continuity User Tips Mobile Devices Mobile Office Disaster Recovery Computer Network Virtualization Microsoft Office Server VoIP Social Media Windows 10 Miscellaneous Upgrade Mobile Device Management Windows Android Unified Threat Management Ransomware Smartphone Innovation Passwords Holiday Operating System Remote Computing Remote Monitoring WiFi Vendor Management Mobile Computing BYOD Communication Apps Facebook The Internet of Things Marketing Collaboration Managed IT services Users Analytics History Firewall Alert IT Support Data Management Apple Save Money Cybersecurity Managed IT Services Phishing Outsourced IT IT Consultant Big data Content Filtering Health Bring Your Own Device Office Productivity Automation Gmail App Windows 8 Artificial Intelligence communications Tech Support Best Practice Budget BDR Spam Going Green Wireless Technology Search Outlook Hiring/Firing Lithium-ion Battery Virus Hard Drives Browser Managed IT Employer-Employee Relationship Antivirus Cost Management Printer Information Technology Data Backup IBM Mobile Device Internet of Things Bandwidth Encryption Update Maintenance Office 365 Money Phone System Recovery Help Desk Data storage Computers Risk Management Legal Humor SaaS Customer Service Document Management Travel Education It Management Saving Time Hard Drive Save Time Networking Administration Running Cable Law Enforcement Proactive IT Government VPN Flexibility Word Twitter Cortana Password Fax Server Hacker iPhone Project Management Business Intelligence Tablet Hosted Solution Two-factor Authentication Avoiding Downtime Robot Wireless Website Computer Repair Current Events Excel Black Market Mobility Intranet Business Growth Hacking Windows 10 Telephone Systems Training User Digital Payment Disaster End of Support Comparison DDoS Securty PowerPoint Data Recovery Solid State Drive Social Networking Text Messaging Co-managed IT Cybercrime Google Maps Patch Management Cryptocurrency Google Docs Laptop Cloud Computing Lifestyle Hack Office Tips Processors Bitcoin Downtime Net Neutrality USB Paperless Office Presentation Company Culture Sports Virtual Desktop Computing Distributed Denial of Service Programming Documents Heating/Cooling Trending Public Cloud IT service Pain Points Social Engineering Compliance Statistics User Error Computing Infrastructure Retail Experience eWaste Scam Automobile Streaming Media Gaming Console Telephony Inbound Marketing Monitors Webcam How To Digital YouTube Chrome Unified Communications Start Menu Settings Safety Specifications Router Taxes Computer Accessories Software as a Service Social Access Control Uninterrupted Power Supply Customer Relationship Management Network Congestion Augmented Reality Mouse Politics Data Security Chromebook GPS Fake News cache CCTV Analytic Messenger Vulnerabilities Data Loss Public Speaking Mobile Technology Corporate Profile In Internet of Things Work/Life Balance Ebay Download 3D Microsoft Excel Assessment Emails Recycling Scalability Books Business Cards Redundancy IT consulting Entrepreneur Data Breach Cleaning Mobile Payment VoIP HIPAA Harddrive Business Managemenet Pirating Information Microchip Adminstration Consultation CIO Electronic Payment Meetings Cabling External Harddrive Private Cloud Reading Regulations Windows XP Audit Society IP Address Television Administrator Hacks Micrsooft Human Resources Blockchain Content Management Supercomputer Worker Smart Phones Machine Learning Relocation Get More Done Emergency Identity Theft Computer Care SharePoint Skype Printer Server Video Surveillance Notifications Tip of the week Google Drive Employer Employee Relationship Vulnerability LinkedIn Licensing Teamwork Reliable Computing Saving ZTime Virtual Reality Printing Music Evernote Electricity Storage Botnet Debate Upgrades Virtual Assistant PDF Archive Business Technology LiFi Keyboard Best Available Bluetooth Downloads Domains Data Warehousing WannaCry Point of Contact Upselling Computer Malfunction Product Reviews Webinar Read Rental Service Deep Learning Hard Drive Disposal Time Management Visible Light Communication Shortcut Value Thin CLient Memory Wi-Fi Google Calendar Windows Server 2008 Troubleshooting Motion Sickness Tracking Staffing Unified Threat Management Touchscreen Environment Knowledge Advertising Competition Leadership Best Practives Flash Technology Tips Google Wallet Windows 7 Business Owner Web Server Workers Device Management Microserver Displays Fiber-Optic Websites Tech Terms Application Banking Drones Freedom of Information Access Samsung Turn Key File Sharing Fraud online Currency Permissions Digital Signature G Suite Trojan Language Organize Business Metrics News Spyware Entertainment Physical Security Tablets Writing email scam switches Data Protection Sync 3D Printing Piracy Capital Software License Productuvuty CrashOverride

hp supplies medallionLarge2017