Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

A recent Wi-Fi security report from Wandera analyzed a set of 100,000 company-owned mobile devices and found that 74% of wireless data took advantage of a nearby Wi-Fi network. 12% of those Wi-Fi hotspots lacked any type of encryption to secure the connection. Furthermore, only 4% of these company-owned devices were exposed to accidental or deliberate “man-in-the-middle” attacks.

When we say a man-in-the-middle attack, we’re basically talking about a situation where one computer has contracted malware that allows another machine to steal data that’s flowing to and from it. Once the machine has connected to a Wi-Fi connection, the malware is then transferred to the network, thereby infecting the entire network with the malware and giving the hacker free rein to cause all kinds of trouble.

Surprisingly enough, cellular networks are much more secure than a normal Wi-Fi network, since cellular providers take advantage of encryption that protects users. Yet, even still, users will prefer to use a Wi-Fi connection over a cellular provider connection when given the choice. One statistic claims that up to 60% of people will simply connect to any public Wi-Fi they find rather than resort to their cellular data--even if it’s paid for by the company they work for. Symantec’s Wi-Fi Risk Report comes to a similar conclusion, claiming that people believe their data is more secure if it’s transmitted over Wi-Fi. 53% of people can’t even tell the difference between a secured network and an unsecured network, and 90% of consumers have put some type of personal information at risk using public Wi-Fi.

At the business level, the state of affairs shifts favorably. Individual Wi-Fi use still seems similar, but businesses do a much better job of securing a network from online threats and malicious users. A firewall is one of the best ways to do so, since it actively keeps threats out of your network by checking data that enters it. When a user is accessing your organization’s Wi-Fi, they can then access the entire network that’s hosted on it--including any servers or confidential information that’s found on it. By partitioning information behind the firewall, you’re making your business that much more secure against online threats.

Another way to do so is by implementing what’s called a Virtual Private Network, or VPN. A VPN adds another layer of security by implementing encryption. Basically, it protects your data by ensuring it’s traveling through a secure tunnel of sorts, shielding it from view by those who might be lurking in the shadows. A VPN is a staple of remote computing because it’s really the only way to make sure that your sensitive company data is being transferred as securely as possible. A VPN ultimately keeps you from spending even more money on potential data breaches, and is a considerable benefit when factoring in organizational mobility.

Does your business need a VPN to secure its data? BNMC can help. To learn more, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Software Business Computing Internet Ransomware Microsoft Hosted Solutions Network Security Android IT Services Business Google Mobile Devices Computer Backup Smartphone Windows Windows 10 Innovation Data Management Small Business Server Cloud Computing Business Continuity Browser Internet of Things App Artificial Intelligence Hardware Encryption Data Business Management User Tips Phishing Gmail Smartphones IT Support Managed Service Provider Data Recovery Outsourced IT Efficiency Saving Money Tip of the week Managed IT Services Office 365 Productivity Remote Monitoring Settings Chrome Money IT Management Word Productivity Office Tips Communication Cybersecurity Antivirus Big Data IT Support Infrastructure Facebook Robot Google Drive Windows 10 Risk Management Upgrade Vulnerability Data storage Telephone Systems Hosted Solution Alert VPN Data Security Outlook Workplace Tips Monitors Firewall Server Management Bandwidth Save Money Virtual Private Network YouTube Automation communications Social Media Mouse Employer-Employee Relationship Virtual Reality Miscellaneous Apple SaaS Disaster Recovery Storage Government Passwords Data Backup HIPAA Unified Threat Management LiFi BYOD Mobile Security Managed IT Services Computing Administration Business Technology Content Filtering Maintenance Analytics End of Support Two-factor Authentication Mobile Device Network Scam Microsoft Office Holiday Data loss Display Tech Term Google Calendar Servers Gadgets Dark Web desktop Alt Codes Politics Cooperation Digital Compliance Legislation Collaboration Apps Samsung Halloween Users Budget Microsoft Excel Typing Techology Document Management Quick Tips Tech Support Humor Staff Spyware Regulations Current Events Tablet Statistics File Sharing Education Scary Stories Blockchain Solid State Drive Mail Merge Cryptocurrency Unified Threat Management Identity Theft VoIP Websites Website Augmented Reality Going Green Comparison Bluetooth Remote Computing Unified Communications Sports Permissions Hard Disk Drive Address Bitcoin User Error Avoiding Downtime Wearable Technology The Internet of Things Writing Printing Specifications Cabling Legal Fraud How To Windows 8 Printer Time Management VoIP Dark Data Cybercrime Retail Black Friday Search WiFi Marketing Emergency Applications Firefox Access Control Digital Payment Network Management Customer Service Office Cyber Monday Disaster Vendor Management Operating System Hotspot IT Technicians Social SharePoint Touchscreen Social Engineering Information Technology Smart Technology Uninterrupted Power Supply Managed IT IT solutions Lenovo Computer Care Language IBM Best Practice Mirgation Downloads Wireless Running Cable Safety Distributed Denial of Service Shortcut Superfish Training Buisness Google Docs Computing Infrastructure Corporate Profile Network Congestion Chatbots Hacks Automobile Virtual Desktop Laptop Google Wallet Managed IT Service Dell Patch Management Paperless Office Business Growth Deep Learning Customer Relationship Management Wi-Fi Alerts WannaCry Computers Identity Password Multi-Factor Security Google Maps Heating/Cooling Spam Drones Break Fix Hacker Networking Bring Your Own Device Downtime Licensing Mobile Device Management How To Cameras Tracking Health Mobile Computing Black Market CCTV Electronic Medical Records Twitter Notifications Upgrades Travel G Suite Crowdsourcing 3D Printing CrashOverride Supercomputer Botnet Motion Sickness Taxes Unsupported Software IT Budget Machine Learning Update IT Consultant Mobile Data Relocation Recovery Meetings Cleaning Work/Life Balance Private Cloud Chromebook Webcam Law Enforcement Physical Security Error Emoji Ben McDonald shares Point of Sale Gadget Personal Information Cortana Staffing Administrator Virtualization Processors what was your? Web Server GPS Computer Repair

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3