Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Which is More Secure, Your Mobile Network or Wi-Fi?

Which is More Secure, Your Mobile Network or Wi-Fi?

For the modern business, having a strategy to manage your employees smartphone use is essential. This is because most of the people that work for you have smartphones. One study shows that upwards of 90 percent of people under 30 own a smartphone. If you have any design on running a business, or employing millennials (who are the largest generation in the current workforce), you’ll need to know what you are doing to protect your business from the increasing amount of threats that are out there targeting smartphones.

An annual Wi-Fi Security Report conducted by Wandera found that, out of a sample of 100,000 corporate-owned mobile devices, 74% of wireless data was transferred using a Wi-Fi network, 12 percent of Wi-Fi hotspots used by those people are open and lacking encryption, and only four percent of these corporate-owned devices have been exposed to malware through an accidental or deliberate man-in-the-middle attack.

The man-in-the-middle attack (MiTM) is one where a computer will pick up malware that allows an intermediary to intercept files and correspondence between the two machines, and upon connecting to a network via a Wi-Fi connection, transfers the malware onto the computing network--thus infecting the network with the malware that allows the hacker to intercept any communication.

It’s largely understood that cellular networks are more secure than Wi-Fi networks, as cellular networks utilize high-end encryption techniques. This doesn’t make them popular, however. People will typically use Wi-Fi that is available. In fact, one statistic suggests that people are so addicted to the use of Wi-Fi that upwards of 60 percent of people will connect to any available public Wi-Fi rather than use the cellular data, even if they don’t pay for it themselves. Symantec’s Wi-Fi Risk Report corroborates this notion, adding that roughly the same number of people believe their personal information is more secure transmitted over Wi-Fi, and that 53 percent cannot tell the difference between a secure and unsecure Wi-Fi network. The report goes on to state that nearly nine out of ten consumers have put their information at risk by using public Wi-Fi.

At the business level things get a little better. While individual Wi-Fi use remains similar, businesses typically do a much better job of securing their network to keep malicious entities out. One way they do this is by setting up a firewall to keep their Wi-Fi networks away from the rest of their network. Typically, when a person accesses your organization’s Wi-Fi, they are then able to access your whole entire network. If your servers and other confidential data are linked to your organizational Wi-Fi, then an intruder who can manage to connect will then have access. By separating your Wi-Fi from your network behind a firewall, you will not only protect yourself from ambitiously malignant people on your network, but also go a long way toward safeguarding your network from cyber attacks in general.

Another way that the business can ensure their mobile strategy won’t hamstring their company’s network is by instituting a Virtual Private Network (VPN). The VPN brings additional encryption to data communication by creating a secure tunnel in which to transfer data. For the small business a VPN has become an almost essential part of providing your staff with a workable remote computing situation. Not only does it work to secure your business’ data while using available remote connections, it makes it easier to scale a business by allowing new systems to connect to it with minimal configuration. In doing so, the deployment of a strategic VPN reduces capital investment and is a major benefit for organizational mobility.

If you haven’t already, your business is going to have to address your mobile security before it gets burned. If you would like to learn more about what you are up against, or how you can utilize today’s security technology to protect your business’ important data, call Computerware today at (703) 821-8200.

Tip of the Week: Why You Should Reconsider Your Be...
These Gifts Can Come with Security Issues


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Business Computing Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones Gadgets Quick Tips Mobile Devices Business Continuity User Tips Disaster Recovery Computer Virtualization Mobile Office Network Microsoft Office Server VoIP Social Media Smartphone Mobile Device Management Android Innovation Windows 10 Miscellaneous Upgrade Windows Ransomware Unified Threat Management Remote Monitoring Holiday Operating System Remote Computing Mobile Computing Passwords Collaboration BYOD Communication Apps WiFi Vendor Management Marketing Facebook The Internet of Things Firewall Cybersecurity Analytics Users Managed IT services History Apple Data Management Alert IT Support communications Productivity Phishing Internet of Things IT Consultant Save Money Managed IT Services Outsourced IT Automation Gmail App Big data Content Filtering BDR Spam Bring Your Own Device Health Office Outlook Lithium-ion Battery Hiring/Firing Hard Drives Maintenance Bandwidth Virus Data Backup Antivirus Browser Artificial Intelligence Windows 8 Information Technology Best Practice Going Green Mobile Device Budget Tech Support Managed IT Wireless Technology Search Data Recovery Hacking Money Office 365 Help Desk Encryption Recovery Employer-Employee Relationship Phone System Cost Management IBM Printer Update Save Time SaaS Cloud Computing Administration Running Cable Proactive IT Computers VPN Government Cybercrime It Management Networking Hard Drive Risk Management Training Document Management Law Enforcement Humor Two-factor Authentication Customer Service Data storage Saving Time Travel Intranet Website Education Legal Data Loss Digital Payment Data Breach Hosted Solution Robot Comparison Augmented Reality Project Management User PowerPoint Social Engineering Compliance Social Networking Black Market DDoS Twitter Business Growth Word Password Telephone Systems Cortana iPhone Mobility Business Intelligence Hacker Disaster Downtime Fax Server End of Support Tablet Windows 10 Securty Company Culture Computer Repair Solid State Drive Wireless Flexibility Avoiding Downtime Access Control Laptop Current Events Data Security Excel Chrome Paperless Office Blockchain Sports Emails Gaming Console Router Computing Redundancy Hack Computer Accessories Identity Theft Customer Relationship Management Webcam IT service Private Cloud Specifications Mouse Virtual Reality Safety Social Text Messaging Bluetooth Distributed Denial of Service Network Congestion Computing Infrastructure Public Cloud Telephony Monitors Co-managed IT Business Technology Net Neutrality YouTube Automobile Settings Scam Unified Communications Lifestyle Processors USB How To Presentation Digital Trending Politics Websites Virtual Desktop Tech Terms Start Menu Documents Taxes Programming Statistics Software as a Service Vulnerabilities Heating/Cooling Cryptocurrency Uninterrupted Power Supply Mobile Technology Google Docs Streaming Media Pain Points Retail Tech Term Inbound Marketing Cleaning Data Protection Experience Office Tips Bitcoin eWaste User Error Regulations Patch Management Google Maps Value Troubleshooting In Internet of Things Device Management HTML Society Corporate Profile Television Staffing Micrsooft Assessment Environment Hacks Relocation Software License Competition Scalability Business Owner online Currency Devices VoIP SharePoint Best Practives Consultation Tip of the week Meetings Notifications Reliable Computing IT Plan Application Cabling Evernote Administrator Microserver Audit Accountants Music Upgrades Virtual Assistant Supercomputer Machine Learning Emergency Migration GPS LiFi Worker Digital Signature Data Warehousing Entertainment Turn Key Computer Care Equifax Rental Service Trojan Deep Learning Google Drive Hard Drive Disposal Employer Employee Relationship Organize Ebay Memory Vulnerability Desktop 3D Visible Light Communication Licensing Electricity Windows Server 2008 Botnet Analytic Recycling Wi-Fi Printing Startup Unified Threat Management Pirating Information Flash Applications Public Speaking Adminstration Advertising Google Wallet WannaCry Windows 7 Computer Malfunction Downloads Smart Tech Displays Time Management Fiber-Optic Entrepreneur Business Managemenet Content Management Mobile Security HIPAA Drones Freedom of Information Electronic Payment Motion Sickness Banking Google Calendar Multi-Factor Security File Sharing Touchscreen Fraud Tracking Harddrive Video Surveillance Language Knowledge UTM IP Address Permissions News Web Server LinkedIn External Harddrive Business Metrics Technology Tips Legislation Human Resources Saving ZTime Writing email scam switches Workers Skype Archive Debate Multi-factor Authentication Access Fake News Smart Phones Chromebook Wireless Headphones Get More Done Point of Contact Messenger Printer Server Samsung Teamwork Storage G Suite Work/Life Balance Device security Thin CLient Spyware Microsoft Excel PDF Physical Security Download Books Business Cards Keyboard IT consulting Tablets Best Available Sync Product Reviews Domains Mobile Payment Leadership cache CIO CCTV Read Microchip Upselling Reading Webinar Piracy Shortcut Windows XP Capital Productuvuty CrashOverride Nanotechnology 3D Printing