Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

A recent Wi-Fi security report from Wandera analyzed a set of 100,000 company-owned mobile devices and found that 74% of wireless data took advantage of a nearby Wi-Fi network. 12% of those Wi-Fi hotspots lacked any type of encryption to secure the connection. Furthermore, only 4% of these company-owned devices were exposed to accidental or deliberate “man-in-the-middle” attacks.

When we say a man-in-the-middle attack, we’re basically talking about a situation where one computer has contracted malware that allows another machine to steal data that’s flowing to and from it. Once the machine has connected to a Wi-Fi connection, the malware is then transferred to the network, thereby infecting the entire network with the malware and giving the hacker free rein to cause all kinds of trouble.

Surprisingly enough, cellular networks are much more secure than a normal Wi-Fi network, since cellular providers take advantage of encryption that protects users. Yet, even still, users will prefer to use a Wi-Fi connection over a cellular provider connection when given the choice. One statistic claims that up to 60% of people will simply connect to any public Wi-Fi they find rather than resort to their cellular data--even if it’s paid for by the company they work for. Symantec’s Wi-Fi Risk Report comes to a similar conclusion, claiming that people believe their data is more secure if it’s transmitted over Wi-Fi. 53% of people can’t even tell the difference between a secured network and an unsecured network, and 90% of consumers have put some type of personal information at risk using public Wi-Fi.

At the business level, the state of affairs shifts favorably. Individual Wi-Fi use still seems similar, but businesses do a much better job of securing a network from online threats and malicious users. A firewall is one of the best ways to do so, since it actively keeps threats out of your network by checking data that enters it. When a user is accessing your organization’s Wi-Fi, they can then access the entire network that’s hosted on it--including any servers or confidential information that’s found on it. By partitioning information behind the firewall, you’re making your business that much more secure against online threats.

Another way to do so is by implementing what’s called a Virtual Private Network, or VPN. A VPN adds another layer of security by implementing encryption. Basically, it protects your data by ensuring it’s traveling through a secure tunnel of sorts, shielding it from view by those who might be lurking in the shadows. A VPN is a staple of remote computing because it’s really the only way to make sure that your sensitive company data is being transferred as securely as possible. A VPN ultimately keeps you from spending even more money on potential data breaches, and is a considerable benefit when factoring in organizational mobility.

Does your business need a VPN to secure its data? Haber Group can help. To learn more, reach out to us at 866.625.3560.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 23 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Email Hackers Malware Business Internet Business Computing Hosted Solutions Computer Microsoft Software Backup Ransomware Windows 10 Network Security Android Mobile Devices Smartphone IT Services User Tips Data Management Google Hardware Small Business Productivity Windows Browser Server Cloud Computing Business Continuity Gmail Data Efficiency Facebook Office 365 Upgrade Smartphones Saving Money Artificial Intelligence Data Recovery Internet of Things Managed Service Provider App Encryption Phishing Outsourced IT Remote Monitoring Innovation Office Tips Data Backup Workplace Tips IT Support Business Management Managed IT Services Disaster Recovery Infrastructure Microsoft Office Spam Big Data Tip of the week Social Media Government Word Firewall Robot Risk Management Customer Service IT Support Passwords Communication Two-factor Authentication IT Management Chrome Data storage Antivirus Cybersecurity Employer-Employee Relationship Money WiFi Productivity Tech Term Windows 10 Miscellaneous Apple Settings Content Filtering Wi-Fi VPN Hacking communications BYOD Data Security Automation Printing Virtual Private Network HIPAA Presentation Server Management Avoiding Downtime Computing Mobile Device Hacker Office Managed IT Services Google Drive Wireless Technology Recovery Telephone Systems LiFi Mobile Security Maintenance Website Analytics Holiday Bandwidth Outlook Search Augmented Reality Business Technology End of Support Data loss Safety Administration VoIP Password The Internet of Things Save Money Virtual Reality Mouse SaaS Network Scam Storage Tablet IBM Wireless Vulnerability Hosted Solution Unified Threat Management Apps Monitors YouTube Customer Relationship Management FCC Knowledge Hard Disk Drive Typing Wearable Technology Competition Firefox Servers BDR Motherboard Comparison Title II Experience 5G Operating System Unified Communications Cryptocurrency Computer Care Running Cable Techology Vendor Management Google Maps Router Virtual Desktop Specifications Fraud Online Mail Merge Marketing Bitcoin Training Applications Laptop Unified Threat Management Writing IP Address Statistics Information Technology Modem Automobile Black Friday Paperless Office Microsoft Excel Address Google Docs Windows 8 IT Technicians Halloween User Error Retail Quick Tips Mobile Office Bluetooth Google Wallet Cookies Cyber Monday Hotspot Blockchain Remote Computing Hard Drives Corporate Profile Mirgation Scary Stories Printer Social Engineering VoIP Smart Technology Mobile Device Management Drones Nanotechnology Language Permissions Refrigeration WannaCry Time Management Social Chatbots Sports Politics Access Control Public Speaking Distributed Denial of Service Lithium-ion battery Cabling Education Collaboration Deep Learning Computing Infrastructure Humor Network Management Hacks Document Management Identity Tech Support SharePoint How To Managed IT Service Managed IT Budget File Sharing Bring Your Own Device Alerts Fun Samsung Lenovo Undo Network Congestion Digital sip Touchscreen Identity Theft Buisness Websites Downloads Break Fix Shortcut Application Disaster Gadgets IT solutions Best Practice Licensing Superfish Virtualization Computers Spyware telephony Compliance Multi-Factor Security Dark Web Cortana Patch Management Uninterrupted Power Supply Users Business Growth Cooperation Display Current Events Regulations Downtime Google Calendar Net Neutrality Solid State Drive Legal Alt Codes Staff Cybercrime Networking How To Dark Data Heating/Cooling User IT service Going Green Digital Payment Social Networking Legislation Meetings Chromebook Cleaning Mobile Data Private Cloud Webcam Emoji Work/Life Balance Error Point of Sale Black Market Law Enforcement Physical Security Twitter Staffing Gadget Personal Information Administrator Web Server GPS Domains Computer Repair Cameras Processors Emergency Tracking Health Screen Reader CCTV Alert Electronic Medical Records Smart Tech Connectivity Travel G Suite Notifications Mobile Computing Supercomputer Botnet Upgrades Motion Sickness Taxes Crowdsourcing CrashOverride IT Budget Machine Learning 3D Printing Update IT Consultant Relocation Unsupported Software