Which is More Secure, Your Mobile Network or Wi-Fi?

Which is More Secure, Your Mobile Network or Wi-Fi?

For the modern business, having a strategy to manage your employees smartphone use is essential. This is because most of the people that work for you have smartphones. One study shows that upwards of 90 percent of people under 30 own a smartphone. If you have any design on running a business, or employing millennials (who are the largest generation in the current workforce), you’ll need to know what you are doing to protect your business from the increasing amount of threats that are out there targeting smartphones.

An annual Wi-Fi Security Report conducted by Wandera found that, out of a sample of 100,000 corporate-owned mobile devices, 74% of wireless data was transferred using a Wi-Fi network, 12 percent of Wi-Fi hotspots used by those people are open and lacking encryption, and only four percent of these corporate-owned devices have been exposed to malware through an accidental or deliberate man-in-the-middle attack.

The man-in-the-middle attack (MiTM) is one where a computer will pick up malware that allows an intermediary to intercept files and correspondence between the two machines, and upon connecting to a network via a Wi-Fi connection, transfers the malware onto the computing network--thus infecting the network with the malware that allows the hacker to intercept any communication.

It’s largely understood that cellular networks are more secure than Wi-Fi networks, as cellular networks utilize high-end encryption techniques. This doesn’t make them popular, however. People will typically use Wi-Fi that is available. In fact, one statistic suggests that people are so addicted to the use of Wi-Fi that upwards of 60 percent of people will connect to any available public Wi-Fi rather than use the cellular data, even if they don’t pay for it themselves. Symantec’s Wi-Fi Risk Report corroborates this notion, adding that roughly the same number of people believe their personal information is more secure transmitted over Wi-Fi, and that 53 percent cannot tell the difference between a secure and unsecure Wi-Fi network. The report goes on to state that nearly nine out of ten consumers have put their information at risk by using public Wi-Fi.

At the business level things get a little better. While individual Wi-Fi use remains similar, businesses typically do a much better job of securing their network to keep malicious entities out. One way they do this is by setting up a firewall to keep their Wi-Fi networks away from the rest of their network. Typically, when a person accesses your organization’s Wi-Fi, they are then able to access your whole entire network. If your servers and other confidential data are linked to your organizational Wi-Fi, then an intruder who can manage to connect will then have access. By separating your Wi-Fi from your network behind a firewall, you will not only protect yourself from ambitiously malignant people on your network, but also go a long way toward safeguarding your network from cyber attacks in general.

Another way that the business can ensure their mobile strategy won’t hamstring their company’s network is by instituting a Virtual Private Network (VPN). The VPN brings additional encryption to data communication by creating a secure tunnel in which to transfer data. For the small business a VPN has become an almost essential part of providing your staff with a workable remote computing situation. Not only does it work to secure your business’ data while using available remote connections, it makes it easier to scale a business by allowing new systems to connect to it with minimal configuration. In doing so, the deployment of a strategic VPN reduces capital investment and is a major benefit for organizational mobility.

If you haven’t already, your business is going to have to address your mobile security before it gets burned. If you would like to learn more about what you are up against, or how you can utilize today’s security technology to protect your business’ important data, call Celera Networks today at (617) 375-9100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 17 January 2018

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Privacy Best Practices Cloud Hackers Productivity Business Computing business Malware Microsoft Internet IT Services Backup Hosted Solutions Managed Service Provider IT Support Email Mobile Devices Workplace Tips Network Communication Hardware Computer Smartphones Microsoft Office Disaster Recovery Holiday Windows Miscellaneous Mobile Device Management Data Windows 10 Business Continuity Small Business network security Efficiency Alert Smartphone Server Upgrade Saving Money User Tips Business Management Google Virtualization Software Social Media WiFi Remote Computing Internet of Things Operating System Gmail Ransomware VoIP BYOD Passwords Big Data Android Browser Mobile Computing The Internet of Things Apple Spam Innovation Cybersecurity Vendor Management App Remote Monitoring Office Budget Artificial Intelligence Apps Collaboration Wireless Technology Phishing Analytics Business Growth Facebook Risk Management Save Money Hacker Going Green Robot Outsourced IT Retail Best Practice Office Tips Tech Support Gadgets Bring Your Own Device Data Management Customer Service Automation IT Solutions Office 365 Information Technology Managed IT Services Money Data storage Recovery Presentation Firewall Hacking Content Filtering Hard Drives Running Cable Cortana Lithium-ion Battery Customer Relationship Management Employer-Employee Relationship virus Cost Management Document Management End of Support Computers Proactive IT Current Events Avoiding Downtime Managed IT Health Mobile Device Hosted Solution Bitcoin IT service Outlook IT Consultant Application Saving Time Excel Work/Life Balance Hiring/Firing Tablet Update Social Windows 8 Downtime Law Enforcement LiFi Business Owner Competition eWaste Search Humor Quick Tips Trending Education Safety Analyitcs Network Congestion Mouse Twitter Antivirus Programming Encryption Specifications iPhone project management User Disaster Website intranet Wireless Laptop Settings Net Neutrality Phone System Bandwidth VPN Chrome USB Virtual Desktop PowerPoint IT Support Administration Samsung Cryptocurrency Maintenance Statistics Social Engineering Password Save Time Google Docs Two-factor Authentication Marketing communications Hacks Cybercrime SharePoint Sports Compliance Unified Communications Tip of the week Travel cyberattacks Printing Fun Computing Infrastructure Distributed Denial of Service Storage Regulations Paperless Office Digital Private Cloud Data loss businesses Computing Entrepreneur Vulnerability Refrigeration Evernote Debate Dark Data Gadget Buisness Deep Learning IP Address Consumers Virtual Assistant IT Management Skype Software as a Service Memory Google Wallet Knowledge Online Currency Networking Data Warehousing Politics CIO Mobile Office Hard Drive Public Cloud Google Calendar LinkedIn Technology Tips Drones Black Market Experience Environment Business Cards Company Culture Windows Server 2008 Telephony User Error Identities security breach Windows 8.1 Update Data Security Printer Access Control Best Available Mobile Technology People Troubleshooting History Undo Windows 7 Training Solid State Drive Modern technology Hard Drive Disposal Printer Server Video Surveillance Mobile Payment Backups Processors Display Word Mobility Freedom of Information Licensing Users File Sharing YouTube Alt Codes business owners Unified Threat Management Data Breach Patch Management Managed Service Providers Legal Notifications Monitors Domains News Piracy Files Flexibility Typing Wi-Fi Fiber-Optic Downloads Comparison Telephone Systems bdr Writing Public Speaking Computer Repair Fake News Websites Help Desk 5G Documents Business Intelligence Fraud Productivity data breaches Digital Signature Television Google Drive Crowdsourcing Halloween Heating/Cooling Router IBM Microsoft Excel Botnet Managed IT Services today ’s world risk Crowdfunding PDF email scam Cyber-attacks Government Scary Stories Touchscreen Blockchain experience downtime cyberattack Augmented Reality Co-managed IT Vulnerabilities Meetings Physical Security Software Tips Relocation WannaCry Webcam Motion Sickness Chromebook GPS Data Backup How To Personal Information Error Cleaning Emoji Tracking Cloud Computing Upgrades Electronic Medical Records Computer Care Identity Theft Cabling 3D Printing Automobile Staffing Infrastructure Unsupported Software test post Administrator Taxes Uninterrupted Power Supply Mobile Data Sync Web Server Supercomputer Hard Disk Drive Mobile Device Managment Cameras IT Budget CCTV Digital Payment Virtual Reality G Suite Point of Sale Google Maps Machine Learning Corporate Profile Unified Threat Management SaaS