facebook linkedin twitter

Which is More Secure, Your Mobile Network or Wi-Fi?

Which is More Secure, Your Mobile Network or Wi-Fi?

For the modern business, having a strategy to manage your employees smartphone use is essential. This is because most of the people that work for you have smartphones. One study shows that upwards of 90 percent of people under 30 own a smartphone. If you have any design on running a business, or employing millennials (who are the largest generation in the current workforce), you’ll need to know what you are doing to protect your business from the increasing amount of threats that are out there targeting smartphones.

An annual Wi-Fi Security Report conducted by Wandera found that, out of a sample of 100,000 corporate-owned mobile devices, 74% of wireless data was transferred using a Wi-Fi network, 12 percent of Wi-Fi hotspots used by those people are open and lacking encryption, and only four percent of these corporate-owned devices have been exposed to malware through an accidental or deliberate man-in-the-middle attack.

The man-in-the-middle attack (MiTM) is one where a computer will pick up malware that allows an intermediary to intercept files and correspondence between the two machines, and upon connecting to a network via a Wi-Fi connection, transfers the malware onto the computing network--thus infecting the network with the malware that allows the hacker to intercept any communication.

It’s largely understood that cellular networks are more secure than Wi-Fi networks, as cellular networks utilize high-end encryption techniques. This doesn’t make them popular, however. People will typically use Wi-Fi that is available. In fact, one statistic suggests that people are so addicted to the use of Wi-Fi that upwards of 60 percent of people will connect to any available public Wi-Fi rather than use the cellular data, even if they don’t pay for it themselves. Symantec’s Wi-Fi Risk Report corroborates this notion, adding that roughly the same number of people believe their personal information is more secure transmitted over Wi-Fi, and that 53 percent cannot tell the difference between a secure and unsecure Wi-Fi network. The report goes on to state that nearly nine out of ten consumers have put their information at risk by using public Wi-Fi.

At the business level things get a little better. While individual Wi-Fi use remains similar, businesses typically do a much better job of securing their network to keep malicious entities out. One way they do this is by setting up a firewall to keep their Wi-Fi networks away from the rest of their network. Typically, when a person accesses your organization’s Wi-Fi, they are then able to access your whole entire network. If your servers and other confidential data are linked to your organizational Wi-Fi, then an intruder who can manage to connect will then have access. By separating your Wi-Fi from your network behind a firewall, you will not only protect yourself from ambitiously malignant people on your network, but also go a long way toward safeguarding your network from cyber attacks in general.

Another way that the business can ensure their mobile strategy won’t hamstring their company’s network is by instituting a Virtual Private Network (VPN). The VPN brings additional encryption to data communication by creating a secure tunnel in which to transfer data. For the small business a VPN has become an almost essential part of providing your staff with a workable remote computing situation. Not only does it work to secure your business’ data while using available remote connections, it makes it easier to scale a business by allowing new systems to connect to it with minimal configuration. In doing so, the deployment of a strategic VPN reduces capital investment and is a major benefit for organizational mobility.

If you haven’t already, your business is going to have to address your mobile security before it gets burned. If you would like to learn more about what you are up against, or how you can utilize today’s security technology to protect your business’ important data, call Computerware today at (703) 821-8200.

Tip of the Week: Why You Should Reconsider Your Be...
These Gifts Can Come with Security Issues


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 23, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Business Computing Software Hackers Microsoft Backup Managed Service Provider Workplace Tips Productivity Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Efficiency Hosted Solutions Google Small Business Computer User Tips Smartphones Quick Tips Gadgets Mobile Devices Business Continuity Disaster Recovery Innovation Microsoft Office Android Mobile Office Virtualization Network Social Media VoIP Server Mobile Device Management Collaboration Communication Miscellaneous Smartphone Ransomware Windows 10 Upgrade Windows Data Backup Data Recovery Unified Threat Management IT Support Tech Term Passwords Remote Monitoring Operating System Vendor Management Holiday Mobile Computing BYOD Productivity Remote Computing Managed IT services Cybersecurity WiFi Apps Facebook communications Analytics Marketing BDR The Internet of Things Users Automation History Firewall Apple Mobile Device Managed IT Services Alert Outsourced IT Internet of Things Data Management Phishing IT Consultant Browser Artificial Intelligence Save Money Big data App Content Filtering Going Green Gmail Health Office Bring Your Own Device Antivirus Bandwidth Spam Encryption Maintenance Printer Hiring/Firing Budget Lithium-ion Battery Virus Hard Drives Best Practice Information Technology Tech Support Two-factor Authentication Help Desk Cybercrime Wireless Technology Search Cost Management Outlook Windows 8 Managed IT Office 365 Training Document Management IBM Saving Time Computers VPN Phone System Travel Recovery Employer-Employee Relationship Cloud Computing Update Business Technology Hacking Money Windows 10 Legal Running Cable Customer Service Networking Proactive IT Hard Drive Regulations Government Website Intranet Education Access Control SaaS Administration Risk Management It Management Law Enforcement Compliance Data storage Save Time Humor Comparison Tablet User Laptop Data Breach Business Growth Company Culture Excel Computer Repair Project Management File Sharing Social Networking Information Wireless Customer Relationship Management DDoS Paperless Office Augmented Reality Mobility Twitter Sports PowerPoint Social Engineering Disaster Computing Current Events Word Hosted Solution End of Support Robot Applications Securty Password Data Security Cortana Solid State Drive Fax Server Business Intelligence Patch Management Hacker Blockchain Digital Payment Avoiding Downtime Data Loss Black Market Machine Learning Downtime Flexibility iPhone Telephone Systems Pain Points Vendor Google Docs Monitoring Trending Virtual Desktop Experience Public Cloud Specifications Safety Cleaning Monitors Mouse Digital Social Websites Office Tips Identity Theft Documents Management Statistics Heating/Cooling Programming Start Menu Entertainment Tech Terms Mobile Technology Vulnerabilities Google Maps Network Congestion Storage YouTube Unified Communications Settings Politics Software as a Service Gaming Console Virtual Reality Healthcare Emails Automobile Uninterrupted Power Supply Webcam User Error Streaming Media Retail Text Messaging Co-managed IT Chromebook Bitcoin Computing Infrastructure Hack eWaste Value How To Data Protection IT service Net Neutrality Private Cloud Download Lifestyle Managed Service Chrome Telephony Processors Inbound Marketing Conferencing Bluetooth USB Router Scam Taxes Cryptocurrency Presentation Redundancy Distributed Denial of Service Computer Accessories Microserver Employer Employee Relationship Touchscreen Application News UTM Content G Suite VoIP Human Resources Visible Light Communication Memory Hacks Physical Security LinkedIn Consultation Evernote IT Plan Enterprise Resource Planning Licensing Knowledge Legislation Error IT consulting Technology Tips email scam Addiction Get More Done Relocation Tablets Virtual Assistant Browsers Accountants A.I. Banking Botnet Advertising Flash Turn Key Skype Digital Signature Fake News Upselling User Tip Multi-factor Authentication CIO Printer Server Sync Archive Audit Notifications CCTV Teamwork Data Warehousing Migration Connected Devices Staffing Google Wallet Trojan Wireless Headphones Video Surveillance Telephone Windows XP Access Saving ZTime Network Management Society Reliable Computing Point of Contact Emergency Hard Drive Disposal Data Analysis Equifax Fleet Tracking Displays Organize Business Metrics Computer Malfunction Microsoft Excel Device security MSP Micrsooft In Internet of Things PDF Computer Care Best Available Google Drive Keyboard Windows Server 2008 Harddrive Desktop Finance Drones Nanotechnology Debate Social Network Spyware Mobile Payment Business Cards Service Level Agreement Scalability Analytic Vulnerability Domains GPS Startup Asset Tracking Motion Sickness Recycling Permissions Language Messenger Tracking Product Reviews Public Speaking Proxy Server Username Webinar Electricity Printing External Harddrive Unified Threat Management Backup and Disaster Recovery Rental Service Meetings Shortcut Windows 7 Electronic Medical Records Gamification Read Screen Reader Customer Resource management cache Entrepreneur Television Piracy Thin CLient Upload Music Cabling Troubleshooting 3D Smart Tech Ebay Distribution switches Writing Web Server Database Books Workers HIPAA Dark Web HTML Upgrades Wi-Fi Administrator Device Management WannaCry Environment Downloads Smart Phones Fiber-Optic Supercomputer Business Managemenet Time Management Competition Freedom of Information Health IT Mobile Security Content Management Corporate Profile Electronic Payment Telephone System LiFi Assessment SharePoint Software License Leadership Trends Best Practives Worker Business Owner Adminstration Multi-Factor Security Pirating Information Cost Microchip Fraud Tactics Work/Life Balance Reading Samsung IP Address Tip of the week Bookmark Devices Deep Learning online Currency Google Calendar 3D Printing Capital Printers Productuvuty Fileless Malware Managing Stress Regulation CrashOverride