Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

A recent Wi-Fi security report from Wandera analyzed a set of 100,000 company-owned mobile devices and found that 74% of wireless data took advantage of a nearby Wi-Fi network. 12% of those Wi-Fi hotspots lacked any type of encryption to secure the connection. Furthermore, only 4% of these company-owned devices were exposed to accidental or deliberate “man-in-the-middle” attacks.

When we say a man-in-the-middle attack, we’re basically talking about a situation where one computer has contracted malware that allows another machine to steal data that’s flowing to and from it. Once the machine has connected to a Wi-Fi connection, the malware is then transferred to the network, thereby infecting the entire network with the malware and giving the hacker free rein to cause all kinds of trouble.

Surprisingly enough, cellular networks are much more secure than a normal Wi-Fi network, since cellular providers take advantage of encryption that protects users. Yet, even still, users will prefer to use a Wi-Fi connection over a cellular provider connection when given the choice. One statistic claims that up to 60% of people will simply connect to any public Wi-Fi they find rather than resort to their cellular data--even if it’s paid for by the company they work for. Symantec’s Wi-Fi Risk Report comes to a similar conclusion, claiming that people believe their data is more secure if it’s transmitted over Wi-Fi. 53% of people can’t even tell the difference between a secured network and an unsecured network, and 90% of consumers have put some type of personal information at risk using public Wi-Fi.

At the business level, the state of affairs shifts favorably. Individual Wi-Fi use still seems similar, but businesses do a much better job of securing a network from online threats and malicious users. A firewall is one of the best ways to do so, since it actively keeps threats out of your network by checking data that enters it. When a user is accessing your organization’s Wi-Fi, they can then access the entire network that’s hosted on it--including any servers or confidential information that’s found on it. By partitioning information behind the firewall, you’re making your business that much more secure against online threats.

Another way to do so is by implementing what’s called a Virtual Private Network, or VPN. A VPN adds another layer of security by implementing encryption. Basically, it protects your data by ensuring it’s traveling through a secure tunnel of sorts, shielding it from view by those who might be lurking in the shadows. A VPN is a staple of remote computing because it’s really the only way to make sure that your sensitive company data is being transferred as securely as possible. A VPN ultimately keeps you from spending even more money on potential data breaches, and is a considerable benefit when factoring in organizational mobility.

Does your business need a VPN to secure its data? BNMC can help. To learn more, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 16 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Email Malware Hackers Business Computing Internet Hosted Solutions Microsoft Software IT Services Business Ransomware Android Computer Smartphone Windows Google Network Security Backup Small Business Windows 10 Internet of Things Data App Hardware Business Continuity Browser Innovation Data Management Smartphones Managed IT Services Data Recovery Saving Money User Tips Artificial Intelligence Outsourced IT Tip of the week Encryption Productivity Remote Monitoring Phishing Office 365 Mobile Devices IT Support Cloud Computing Upgrade Cybersecurity Facebook Managed Service Provider IT Support Data storage Efficiency Risk Management Money Windows 10 Vulnerability Settings Gmail Office Tips Word Robot Google Drive Productivity Big Data Employer-Employee Relationship LiFi Administration Content Filtering Government Microsoft Office Unified Threat Management Managed IT Services Analytics Outlook Maintenance Monitors Save Money Two-factor Authentication Network Scam Automation Mouse Miscellaneous Chrome Apple Mobile Device SaaS Hosted Solution Server IT Management Bandwidth Workplace Tips Virtual Private Network YouTube Holiday Business Management Telephone Systems Social Media communications Alert Computing Firewall Disaster Recovery Antivirus Passwords Data Backup End of Support Safety Websites VoIP Printer Time Management Search WiFi Google Docs Cybercrime Black Friday Hacks Mobile Security Marketing Hard Disk Drive Emergency Network Congestion Google Wallet Access Control Network Management Cabling Wi-Fi Business Growth Cyber Monday Password Hotspot Business Technology Computers Drones How To SharePoint Touchscreen Infrastructure Managed IT IT solutions Hacker Smart Technology Language Lenovo Display BYOD Firefox Downloads Digital Payment Disaster Shortcut Running Cable Alt Codes Distributed Denial of Service Computing Infrastructure Superfish Buisness Virtual Desktop Budget Uninterrupted Power Supply Patch Management Humor Laptop Typing Managed IT Service Current Events Alerts IBM Computer Care Customer Relationship Management Deep Learning Multi-Factor Security Wireless Heating/Cooling Virtual Reality Spam Cryptocurrency Break Fix Going Green Corporate Profile Networking Training Bring Your Own Device Communication Downtime Automobile Google Calendar Servers Dell VPN Storage Bitcoin Dark Web Gadgets Printing WannaCry Data Security Writing Legal Legislation Google Maps Server Management Users Apps Dark Data Halloween Windows 8 Microsoft Excel Data loss Techology Quick Tips Retail Education Tablet Statistics desktop Mail Merge Customer Service Scary Stories Blockchain Website Digital Unified Threat Management VoIP Office Politics Vendor Management Collaboration Operating System Comparison Bluetooth Permissions Address Unified Communications Samsung Sports Social Information Technology Spyware User Error Avoiding Downtime Social Engineering File Sharing The Internet of Things Best Practice Specifications Fraud Solid State Drive Identity Theft Personal Information Travel Cortana G Suite Crowdsourcing Botnet CrashOverride Supercomputer Motion Sickness Virtualization Taxes Machine Learning IT Budget Computer Repair Mobile Device Management IT Consultant How To Relocation Health Meetings Mobile Computing Black Market Cleaning Work/Life Balance Private Cloud Electronic Medical Records Webcam Twitter Law Enforcement Upgrades Error Ben McDonald shares Point of Sale Licensing Remote Computing Gadget 3D Printing Paperless Office Staffing Unsupported Software Administrator what was your? Update Web Server Processors GPS Mobile Data Recovery Cameras Tracking Chromebook CCTV Document Management Tech Support Physical Security Emoji Notifications

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3