Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

A recent Wi-Fi security report from Wandera analyzed a set of 100,000 company-owned mobile devices and found that 74% of wireless data took advantage of a nearby Wi-Fi network. 12% of those Wi-Fi hotspots lacked any type of encryption to secure the connection. Furthermore, only 4% of these company-owned devices were exposed to accidental or deliberate “man-in-the-middle” attacks.

When we say a man-in-the-middle attack, we’re basically talking about a situation where one computer has contracted malware that allows another machine to steal data that’s flowing to and from it. Once the machine has connected to a Wi-Fi connection, the malware is then transferred to the network, thereby infecting the entire network with the malware and giving the hacker free rein to cause all kinds of trouble.

Surprisingly enough, cellular networks are much more secure than a normal Wi-Fi network, since cellular providers take advantage of encryption that protects users. Yet, even still, users will prefer to use a Wi-Fi connection over a cellular provider connection when given the choice. One statistic claims that up to 60% of people will simply connect to any public Wi-Fi they find rather than resort to their cellular data--even if it’s paid for by the company they work for. Symantec’s Wi-Fi Risk Report comes to a similar conclusion, claiming that people believe their data is more secure if it’s transmitted over Wi-Fi. 53% of people can’t even tell the difference between a secured network and an unsecured network, and 90% of consumers have put some type of personal information at risk using public Wi-Fi.

At the business level, the state of affairs shifts favorably. Individual Wi-Fi use still seems similar, but businesses do a much better job of securing a network from online threats and malicious users. A firewall is one of the best ways to do so, since it actively keeps threats out of your network by checking data that enters it. When a user is accessing your organization’s Wi-Fi, they can then access the entire network that’s hosted on it--including any servers or confidential information that’s found on it. By partitioning information behind the firewall, you’re making your business that much more secure against online threats.

Another way to do so is by implementing what’s called a Virtual Private Network, or VPN. A VPN adds another layer of security by implementing encryption. Basically, it protects your data by ensuring it’s traveling through a secure tunnel of sorts, shielding it from view by those who might be lurking in the shadows. A VPN is a staple of remote computing because it’s really the only way to make sure that your sensitive company data is being transferred as securely as possible. A VPN ultimately keeps you from spending even more money on potential data breaches, and is a considerable benefit when factoring in organizational mobility.

Does your business need a VPN to secure its data? Telesys Voice and Data can help. To learn more, reach out to us at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Sunday, 22 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Business Computing Malware Productivity Business Email Microsoft Internet Windows 10 Hosted Solutions Backup Computer IT Services Ransomware Software Managed Service Provider Network Security Android Smartphone Mobile Devices User Tips Google Managed IT services IT Support Workplace Tips Social Media Hardware Browser Communication Business Continuity Efficiency Outsourced IT Disaster Recovery Data Management App Smartphones Innovation Small Business Office Business Management Cloud Computing Upgrade Holiday Data Windows Remote Monitoring Facebook Miscellaneous WiFi Server Data Backup Office 365 Microsoft Office Artificial Intelligence Gmail Big Data Internet of Things Encryption Spam Network Data Recovery Firewall Password Apps Phishing Hosted Solution Recovery Robot Work/Life Balance Infrastructure Word Customer Service Mobile Device Management Hacker Productivity Tip of the week Saving Money Content Filtering Remote Computing Cybersecurity Unified Threat Management Office Tips Passwords Chrome How To Employer-Employee Relationship Government Risk Management Save Money Apple Money Paperless Office Avoiding Downtime Hacking Computers Mobile Computing Tech Term Tech Support Bandwidth Windows 10 Operating System Education Telephone Systems Vendor Management Cybercrime Document Management VoIP Presentation Applications Business Growth Data Security Alert IT Support Social Customer Relationship Management Data storage Managed IT Services Outlook Website Wi-Fi Computing IT Management Two-factor Authentication Virtual Reality Settings Antivirus Health SaaS Mobile Device Analytics BYOD Managed IT Data loss The Internet of Things Augmented Reality Budget Tablet End of Support Running Cable IBM Competition Mouse Collaboration Search Information Technology Legal Bring Your Own Device Sports IT service File Sharing Humor Scam Cortana Twitter Politics Virtualization Vulnerability Monitors Administration Travel Analyitcs Google Drive Websites VPN Automation Physical Security Going Green Identity Theft IT solutions Safety Taxes HIPAA Botnet Wireless Technology Virtual Private Network Printing Specifications Wireless Mobile Security Samsung Server Management Downtime communications User Storage Licensing Maintenance YouTube Digital Payment Unified Communications Computer Care Retail Best Practice LiFi Training Lithium-ion battery Business Owner Project Management Automobile Marketing Business Technology Upgrades Web Server Microsoft Excel Technology Laws Update PowerPoint Network Management Halloween Cooperation Refrigeration Downloads 3D Printing VoIP Staffing Administrator Consumers Fort Worth Lenovo Cameras Fun Blockchain Unified Threat Management Chromebook Touchscreen BDR Deep Learning Scary Stories Staff Law Enforcement Multi-Factor Security Shortcut Network Congestion Disaster Unsupported Software Digital GPS Compliance flu shot Superfish CCTV eWaste Permissions business communications systems Emoji Google Maps Flexibility Gadget Undo Google Calendar Patch Management Display IT Sevices Uninterrupted Power Supply Mobile Data Spyware Hacks Tracking Regulations IP Address Fort Worth IT Environment Fraud Internet Protocol Alt Codes Operations Legislation Solid State Drive DFW IT Service Networking How To Current Events Social Networking Mobile Office G Suite Troubleshooting Net Neutrality VoIP streamlines Processors Heating/Cooling Typing Hard Disk Drive Buisness Wearable Technology Smart Technology Firefox Motherboard Motion Sickness Knowledge Internet Exlporer business network infrastructure Phone System Servers Google Docs Cryptocurrency Software as a Service Writing Distributed Denial of Service Techology Personal Information Assessment Supercomputer Router Bitcoin IT Consultant Experience data services Help Desk IT Technicians Machine Learning Technology Tips Mail Merge Social Engineering Managed IT Service Disaster Resistance Computer Repair Consultation IT Budget Modem Meetings Windows 8 Cleaning Hotspot User Error Notifications Statistics Mirgation Relocation Domains Comparison Address 5G Break Fix Proactive IT Electronic Medical Records Entrepreneur Google Wallet Cookies Webcam iPhone Language Crowdsourcing Application Printer Bluetooth Dark Data Software Tips Corporate Profile Users Migration Private Cloud Public Speaking Black Friday Redundancy Dark Web IT Consulting Quick Tips Drones Nanotechnology Point of Sale Computing Infrastructure Access Control WannaCry Chatbots Error Cyber Monday Data Warehousing Data Breach Time Management Laptop Alerts Hard Drives SharePoint Cabling Virtual Desktop Identity flu season

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code