Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

A recent Wi-Fi security report from Wandera analyzed a set of 100,000 company-owned mobile devices and found that 74% of wireless data took advantage of a nearby Wi-Fi network. 12% of those Wi-Fi hotspots lacked any type of encryption to secure the connection. Furthermore, only 4% of these company-owned devices were exposed to accidental or deliberate “man-in-the-middle” attacks.

When we say a man-in-the-middle attack, we’re basically talking about a situation where one computer has contracted malware that allows another machine to steal data that’s flowing to and from it. Once the machine has connected to a Wi-Fi connection, the malware is then transferred to the network, thereby infecting the entire network with the malware and giving the hacker free rein to cause all kinds of trouble.

Surprisingly enough, cellular networks are much more secure than a normal Wi-Fi network, since cellular providers take advantage of encryption that protects users. Yet, even still, users will prefer to use a Wi-Fi connection over a cellular provider connection when given the choice. One statistic claims that up to 60% of people will simply connect to any public Wi-Fi they find rather than resort to their cellular data--even if it’s paid for by the company they work for. Symantec’s Wi-Fi Risk Report comes to a similar conclusion, claiming that people believe their data is more secure if it’s transmitted over Wi-Fi. 53% of people can’t even tell the difference between a secured network and an unsecured network, and 90% of consumers have put some type of personal information at risk using public Wi-Fi.

At the business level, the state of affairs shifts favorably. Individual Wi-Fi use still seems similar, but businesses do a much better job of securing a network from online threats and malicious users. A firewall is one of the best ways to do so, since it actively keeps threats out of your network by checking data that enters it. When a user is accessing your organization’s Wi-Fi, they can then access the entire network that’s hosted on it--including any servers or confidential information that’s found on it. By partitioning information behind the firewall, you’re making your business that much more secure against online threats.

Another way to do so is by implementing what’s called a Virtual Private Network, or VPN. A VPN adds another layer of security by implementing encryption. Basically, it protects your data by ensuring it’s traveling through a secure tunnel of sorts, shielding it from view by those who might be lurking in the shadows. A VPN is a staple of remote computing because it’s really the only way to make sure that your sensitive company data is being transferred as securely as possible. A VPN ultimately keeps you from spending even more money on potential data breaches, and is a considerable benefit when factoring in organizational mobility.

Does your business need a VPN to secure its data? Telesys Voice and Data can help. To learn more, reach out to us at (800) 588-4430.


No comments yet
Already Registered? Login Here
Saturday, 20 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Malware Business Computing Privacy Productivity Email Business Microsoft Internet Hosted Solutions Windows 10 Software Managed Service Provider Backup IT Services Ransomware Network Security Computer Mobile Devices Android Smartphone Managed IT services User Tips Browser IT Support Workplace Tips Social Media Outsourced IT Hardware Google Communication Disaster Recovery Innovation Efficiency Business Continuity Data Backup Data Data Management Smartphones App Business Management Cloud Computing Holiday Upgrade Small Business Office Productivity WiFi Internet of Things Facebook Microsoft Office Network Server Remote Monitoring Office 365 Data Recovery Windows Miscellaneous Phishing Encryption Artificial Intelligence Tech Term Gmail Spam Big Data Firewall Robot Apps Save Money Paperless Office Hosted Solution Recovery Password Customer Relationship Management Unified Threat Management Bandwidth Tip of the week Chrome Passwords Cybersecurity How To Content Filtering Apple Government Avoiding Downtime Money Managed IT Services Work/Life Balance Mobile Device Management Wi-Fi Customer Service Office Tips Employer-Employee Relationship Saving Money Risk Management Remote Computing Infrastructure Word Document Management Hacker Computing Education Data Security Cybercrime Health Applications Virtual Reality IT Support SaaS Hacking BYOD Mobile Computing Social Website Tech Support IT Management Mobile Device Operating System Antivirus Project Management File Sharing Two-factor Authentication Settings Managed IT Data loss VoIP Business Growth BDR Analytics Vendor Management Presentation The Internet of Things Computers Alert Windows 10 Telephone Systems Outlook Data storage Compliance Meetings Bring Your Own Device Search Sports Storage Regulations Vulnerability Identity Theft Retail IT service Cortana Virtualization Best Practice VPN Computer Care Administration Lithium-ion battery Business Owner Virtual Private Network Smart Technology Training Assessment IT solutions Safety Marketing HIPAA Server Management Licensing Router Wireless Technology Automobile Digital Payment Upgrades Wireless Mobile Security Budget Downtime End of Support Competition Maintenance communications Mouse YouTube Information Technology Collaboration Unified Communications Legal Humor Tablet LiFi Analyitcs Twitter Politics Monitors Business Technology Travel Google Drive Websites Automation Physical Security Augmented Reality Going Green Specifications Taxes Botnet Healthcare IBM Running Cable Printing Patch Management Samsung User Scam Internet Protocol Flexibility Google Calendar Computer Repair WPA3 Undo Fort Worth IT Cleaning Solid State Drive Notifications How To Relocation iPhone Management IP Address Networking Fraud VoIP streamlines Operations Heating/Cooling Legislation Webcam Alt Codes Electronic Medical Records Fleet Tracking Google Wallet Dark Data Social Networking DFW IT Service Hard Disk Drive Crowdsourcing Firefox Private Cloud Supercomputer Enterprise Resource Planning Mobile Office Net Neutrality business network infrastructure Wearable Technology Servers Point of Sale Help Desk Typing Asset Tracking Drones Buisness Motherboard Error IT Budget Mobile Techology Internet Exlporer data services Software as a Service Cryptocurrency Remote Workers Knowledge PowerPoint Mail Merge Distributed Denial of Service Consultation Vulnerabilities Disaster Resistance Consumers IT Technicians Statistics Technology Tips Web Server Software Tips Bitcoin Update Electronic Health Records Experience Modem Address Managed IT Service User Error Administrator 3D Printing Geography Proactive IT Hotspot Mirgation Bluetooth Comparison Cameras Windows 8 Chromebook Cyberattacks Law Enforcement Network Congestion eWaste Cookies Domains Redundancy Break Fix Corporate Profile Entrepreneur IT Sevices Quick Tips Printer Unsupported Software Cables 5G IT Consulting Language Bookmarks Migration Application Black Friday CCTV History Emoji Gadget Users Display Environment Nanotechnology Public Speaking Dark Web WannaCry Data Breach Computing Infrastructure Time Management Access Control Mobile Data Wires Hacks Favorites Chatbots Cyber Monday Cabling Staffing Troubleshooting IoT Data Warehousing Technology Laws Alerts Network Management SharePoint MSP Current Events Conferencing Laptop Identity Hard Drives flu season G Suite Processors VoIP GPS Virtual Desktop Utility Computing Phone System Lenovo Microsoft Excel Unified Threat Management Cooperation Touchscreen Downloads Motion Sickness Google Maps Proactive Halloween Google Docs Refrigeration Shortcut Fort Worth Disaster Digital Tracking Writing Superfish Blockchain business communications systems Staff Multi-Factor Security Deep Learning Personal Information Remote Monitoring and Management Fun Scary Stories flu shot IT Consultant Uninterrupted Power Supply Spyware Machine Learning Social Engineering Cost Management Permissions

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...