Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

A recent Wi-Fi security report from Wandera analyzed a set of 100,000 company-owned mobile devices and found that 74% of wireless data took advantage of a nearby Wi-Fi network. 12% of those Wi-Fi hotspots lacked any type of encryption to secure the connection. Furthermore, only 4% of these company-owned devices were exposed to accidental or deliberate “man-in-the-middle” attacks.

When we say a man-in-the-middle attack, we’re basically talking about a situation where one computer has contracted malware that allows another machine to steal data that’s flowing to and from it. Once the machine has connected to a Wi-Fi connection, the malware is then transferred to the network, thereby infecting the entire network with the malware and giving the hacker free rein to cause all kinds of trouble.

Surprisingly enough, cellular networks are much more secure than a normal Wi-Fi network, since cellular providers take advantage of encryption that protects users. Yet, even still, users will prefer to use a Wi-Fi connection over a cellular provider connection when given the choice. One statistic claims that up to 60% of people will simply connect to any public Wi-Fi they find rather than resort to their cellular data--even if it’s paid for by the company they work for. Symantec’s Wi-Fi Risk Report comes to a similar conclusion, claiming that people believe their data is more secure if it’s transmitted over Wi-Fi. 53% of people can’t even tell the difference between a secured network and an unsecured network, and 90% of consumers have put some type of personal information at risk using public Wi-Fi.

At the business level, the state of affairs shifts favorably. Individual Wi-Fi use still seems similar, but businesses do a much better job of securing a network from online threats and malicious users. A firewall is one of the best ways to do so, since it actively keeps threats out of your network by checking data that enters it. When a user is accessing your organization’s Wi-Fi, they can then access the entire network that’s hosted on it--including any servers or confidential information that’s found on it. By partitioning information behind the firewall, you’re making your business that much more secure against online threats.

Another way to do so is by implementing what’s called a Virtual Private Network, or VPN. A VPN adds another layer of security by implementing encryption. Basically, it protects your data by ensuring it’s traveling through a secure tunnel of sorts, shielding it from view by those who might be lurking in the shadows. A VPN is a staple of remote computing because it’s really the only way to make sure that your sensitive company data is being transferred as securely as possible. A VPN ultimately keeps you from spending even more money on potential data breaches, and is a considerable benefit when factoring in organizational mobility.

Does your business need a VPN to secure its data? Telesys Voice and Data can help. To learn more, reach out to us at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Hackers Best Practices Cloud Privacy Malware Business Computing Productivity Business Microsoft Email Internet Windows 10 Backup Hosted Solutions IT Services Android Computer Software Smartphone Network Security Managed Service Provider User Tips Workplace Tips Ransomware Google IT Support Mobile Devices Browser Communication Social Media Business Continuity Managed IT services Hardware Smartphones Disaster Recovery App Efficiency Holiday Data Outsourced IT Office Facebook Miscellaneous WiFi Upgrade Microsoft Office Innovation Office 365 Windows Small Business Business Management Remote Monitoring Data Management Network Data Backup Big Data Internet of Things Apps Phishing Encryption Spam Hosted Solution Recovery Artificial Intelligence Password Gmail Firewall Data Recovery Robot Save Money Content Filtering Money Work/Life Balance Tip of the week Cloud Computing Office Tips Cybersecurity Apple Productivity Avoiding Downtime Employer-Employee Relationship Server Risk Management Customer Service Mobile Device Management Unified Threat Management Word Hacker How To SaaS Windows 10 Customer Relationship Management Outlook Social Telephone Systems Chrome Passwords Wi-Fi IT Support Health Two-factor Authentication Settings Managed IT Services Hacking Analytics Alert The Internet of Things Computers Data storage Computing Operating System Bandwidth Managed IT Saving Money Remote Computing Education VoIP Presentation Business Growth Government Cybercrime Specifications Paperless Office BYOD IT solutions Safety Automobile Upgrades Scam Budget Wireless Technology End of Support User Wireless Vulnerability Downtime Mouse Website communications Retail Collaboration YouTube Data Security Legal Best Practice Unified Communications Lithium-ion battery Business Owner File Sharing Virtual Private Network Twitter Politics LiFi Monitors Marketing Travel Vendor Management Google Drive Licensing Mobile Computing Websites Automation Going Green Maintenance Physical Security Competition IT Management Tech Support Digital Payment Taxes Botnet Printing Samsung IBM Information Technology Running Cable Antivirus Humor Mobile Device Bring Your Own Device Search Sports Analyitcs Data loss Computer Care IT service Tablet Cortana Virtual Reality Virtualization Training Applications Administration Disaster Error Smart Technology Typing Shortcut Buisness Superfish Digital GPS Internet Exlporer Software as a Service business communications systems Google Maps Uninterrupted Power Supply Distributed Denial of Service Cryptocurrency Knowledge Patch Management Update Spyware Tracking Web Server Mobile Security Technology Tips Internet Protocol Solid State Drive Administrator Managed IT Service Bitcoin 3D Printing Experience Chromebook Networking How To Document Management Cameras Hotspot Law Enforcement Comparison VoIP streamlines Network Congestion iPhone Heating/Cooling Hard Disk Drive Break Fix Windows 8 Unsupported Software VPN Emoji Printer Domains Firefox Identity Theft CCTV Language Gadget Black Friday business network infrastructure Display 5G Servers Entrepreneur Hacks Application Dark Web Mobile Data Access Control Users Techology Public Speaking Assessment Supercomputer Computing Infrastructure Cyber Monday data services Server Management Help Desk Mail Merge Current Events Data Warehousing Processors SharePoint Disaster Resistance Consultation PowerPoint IT Budget G Suite Alerts flu season User Error Statistics Laptop Address Consumers Hard Drives Motion Sickness Microsoft Excel Downloads Virtual Desktop Proactive IT Google Docs Cooperation Software Tips Fort Worth Writing Augmented Reality Bluetooth Halloween Redundancy Refrigeration Corporate Profile Blockchain Personal Information IT Consultant Staff Multi-Factor Security IT Consulting eWaste Quick Tips IT Sevices Machine Learning flu shot Deep Learning Social Engineering Fun Computer Repair Scary Stories Project Management WannaCry Meetings Permissions Cleaning Notifications Google Calendar Data Breach Storage Environment Time Management Cabling Relocation Fort Worth IT Electronic Medical Records Business Technology Google Wallet Undo Webcam Fraud Crowdsourcing Legislation Technology Laws Dark Data Troubleshooting IP Address Network Management Infrastructure Private Cloud DFW IT Service Alt Codes Lenovo Drones VoIP Staffing Point of Sale Net Neutrality Unified Threat Management Mobile Office Touchscreen Phone System BDR

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code