LiveChat Live Help
Contact us today!
(248) 218-5018
facebooktwittergooglelinkedinyoutubeExpetec Technology Services RSS Feed
 

Expetec Technology Services Blog

Expetec Technology Services has been serving the Troy area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Which is More Secure, Your Mobile Network or Wi-Fi?

Which is More Secure, Your Mobile Network or Wi-Fi?

For the modern business, having a strategy to manage your employees smartphone use is essential. This is because most of the people that work for you have smartphones. One study shows that upwards of 90 percent of people under 30 own a smartphone. If you have any design on running a business, or employing millennials (who are the largest generation in the current workforce), you’ll need to know what you are doing to protect your business from the increasing amount of threats that are out there targeting smartphones.

An annual Wi-Fi Security Report conducted by Wandera found that, out of a sample of 100,000 corporate-owned mobile devices, 74% of wireless data was transferred using a Wi-Fi network, 12 percent of Wi-Fi hotspots used by those people are open and lacking encryption, and only four percent of these corporate-owned devices have been exposed to malware through an accidental or deliberate man-in-the-middle attack.

The man-in-the-middle attack (MiTM) is one where a computer will pick up malware that allows an intermediary to intercept files and correspondence between the two machines, and upon connecting to a network via a Wi-Fi connection, transfers the malware onto the computing network--thus infecting the network with the malware that allows the hacker to intercept any communication.

It’s largely understood that cellular networks are more secure than Wi-Fi networks, as cellular networks utilize high-end encryption techniques. This doesn’t make them popular, however. People will typically use Wi-Fi that is available. In fact, one statistic suggests that people are so addicted to the use of Wi-Fi that upwards of 60 percent of people will connect to any available public Wi-Fi rather than use the cellular data, even if they don’t pay for it themselves. Symantec’s Wi-Fi Risk Report corroborates this notion, adding that roughly the same number of people believe their personal information is more secure transmitted over Wi-Fi, and that 53 percent cannot tell the difference between a secure and unsecure Wi-Fi network. The report goes on to state that nearly nine out of ten consumers have put their information at risk by using public Wi-Fi.

At the business level things get a little better. While individual Wi-Fi use remains similar, businesses typically do a much better job of securing their network to keep malicious entities out. One way they do this is by setting up a firewall to keep their Wi-Fi networks away from the rest of their network. Typically, when a person accesses your organization’s Wi-Fi, they are then able to access your whole entire network. If your servers and other confidential data are linked to your organizational Wi-Fi, then an intruder who can manage to connect will then have access. By separating your Wi-Fi from your network behind a firewall, you will not only protect yourself from ambitiously malignant people on your network, but also go a long way toward safeguarding your network from cyber attacks in general.

Another way that the business can ensure their mobile strategy won’t hamstring their company’s network is by instituting a Virtual Private Network (VPN). The VPN brings additional encryption to data communication by creating a secure tunnel in which to transfer data. For the small business a VPN has become an almost essential part of providing your staff with a workable remote computing situation. Not only does it work to secure your business’ data while using available remote connections, it makes it easier to scale a business by allowing new systems to connect to it with minimal configuration. In doing so, the deployment of a strategic VPN reduces capital investment and is a major benefit for organizational mobility.

If you haven’t already, your business is going to have to address your mobile security before it gets burned. If you would like to learn more about what you are up against, or how you can utilize today’s security technology to protect your business’ important data, call Expetec Technology Services today at (248) 218-5018.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Sign Up for Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Tip of the Week Privacy Technology Best Practices Cloud Internet hackers Business Computing Productivity Business malware IT Support Backup Microsoft Email Software Network Security Data IT Services Hardware Efficiency Hosted Solutions Managed Service Provider Mobile devices User Tips Mobile Device Management Computer Disaster Recovery Workplace Tips Google Business Management Microsoft Office Smartphone Android Holiday Ransomware Miscellaneous Remote Monitoring Smartphones Network analytics Virtualization Windows Business Continuity The Internet of Things Operating System Small Business BYOD Remote Computing Collaboration Server Social Media Cybersecurity Mobile Computing VoIP WiFi Passwords Unified Threat Management Phishing Alert IT Support Managed IT Services Big Data BDR Outsourced IT Upgrade Windows 10 Save Money Saving Money Innovation Gmail Office communications Managed IT Data Management Firewall Vendor Management apple Facebook Artificial Intelligence History Budget Communication Internet of Things Lithium-ion battery Outlook Search Productivity Quick Tips Employer-Employee Relationship Managed IT services Browser Windows 10 Hard Drives Save Time Help Desk Information Technology Cost Management Saving Time Hacking Hiring/Firing Content Filtering App Bandwidth Best Practice Recovery Encryption Proactive IT Money Update Marketing Document Management IT Management Automation Running Cable Wireless Technology Customer Service Apps Antivirus Spam Two-factor Authentication Word Health Law Enforcement Bring Your Own Device Data storage Mobility SaaS Tech Support Intranet Office 365 Hard Drive Hosted Solution Data Backup User Robot Networking Data Recovery Disaster Cybercrime tablet IT Consultant Gadgets IBM Project Management Password Flexibility Training Cryptocurrency Unified Threat Management Start Menu IT service Computers Website Social Networking Retail Travel Uninterrupted Power Supply Government Current Events Going Green avoiding downtime Monitors Wireless Documents Mobile Device PowerPoint Google Docs Scam Net Neutrality Software as a Service Google Maps Downtime Compliance Experience Cloud Computing VPN Legal Chrome Company Culture Safety Phone System Administration Virtual Desktop eWaste Maintenance Computing Infrastructure Access Control DDoS Bitcoin End of Support Risk Management Specifications Heating/Cooling Telephone Systems Data Security YouTube Patch Management Virus Education Unified Communications Cortana Presentation Business Growth Comparison Social Excel iphone Network Congestion Laptop Digital Business Intelligence Telephony Programming Solid State Drive Computing Value Downloads Drones Emergency CIO Access Computer Accessories Windows Server 2008 Read Risk Mangaement Human Resources LinkedIn Computer Care Storage Fiber-Optic Skype Electronic Payment Competition Google Calendar Vulnerability User Error IT consulting Spyware File Sharing Windows 7 Cleaning Touchscreen Entrepreneur Fraud Application Bluetooth Technology Tips Business Technology Sports Windows XP Cache Domains Politics Freedom of Information Society Websites Troubleshooting Router email scam Product Reviews Data Protection Settings Assessment Public Cloud News Displays Windows 8 Business Owner Vulnerabilities Corporate Profile PDF Mobile Technology Office Tips Knowledge Consultation Fake News Upgrades USB Printer Trending Inbound Marketing Business Cards VoIP Co-Managed IT Mobile Payment Micrsooft Tech Terms LiFi Bata Backup How To Microsoft Excel Online Currency Computer Repair Staffing Cabling Capital Television Visible Light Communication Vendor Mangement Customer Relationship Management Pain Points Content Management Music Worker Productuvuty Environment Public Speaking Digital Signature Mouse Statistics Deep Learning Advertising Business Mangement Sync HIPAA Blockchain Writing Teamwork Black Market Securty Licensing Entertainment Keyboard Streaming Media Electricity Hacker SharePoint Data Loss Hack Tip of the week Shortcut Audit Archive Redundancy Data Breach WannaCry IP Address Social Engineering Evernote Gaming Console Permissions Google Drive Distributed Denial of Service Virtual Assistant Regulations Best Available Printing Google Wallet switches Augmented Reality Data Warehousing Time Management Processors Emails Hard Drive Disposal

      Top Blog

      Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
      QR-Code