Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

A recent Wi-Fi security report from Wandera analyzed a set of 100,000 company-owned mobile devices and found that 74% of wireless data took advantage of a nearby Wi-Fi network. 12% of those Wi-Fi hotspots lacked any type of encryption to secure the connection. Furthermore, only 4% of these company-owned devices were exposed to accidental or deliberate “man-in-the-middle” attacks.

When we say a man-in-the-middle attack, we’re basically talking about a situation where one computer has contracted malware that allows another machine to steal data that’s flowing to and from it. Once the machine has connected to a Wi-Fi connection, the malware is then transferred to the network, thereby infecting the entire network with the malware and giving the hacker free rein to cause all kinds of trouble.

Surprisingly enough, cellular networks are much more secure than a normal Wi-Fi network, since cellular providers take advantage of encryption that protects users. Yet, even still, users will prefer to use a Wi-Fi connection over a cellular provider connection when given the choice. One statistic claims that up to 60% of people will simply connect to any public Wi-Fi they find rather than resort to their cellular data--even if it’s paid for by the company they work for. Symantec’s Wi-Fi Risk Report comes to a similar conclusion, claiming that people believe their data is more secure if it’s transmitted over Wi-Fi. 53% of people can’t even tell the difference between a secured network and an unsecured network, and 90% of consumers have put some type of personal information at risk using public Wi-Fi.

At the business level, the state of affairs shifts favorably. Individual Wi-Fi use still seems similar, but businesses do a much better job of securing a network from online threats and malicious users. A firewall is one of the best ways to do so, since it actively keeps threats out of your network by checking data that enters it. When a user is accessing your organization’s Wi-Fi, they can then access the entire network that’s hosted on it--including any servers or confidential information that’s found on it. By partitioning information behind the firewall, you’re making your business that much more secure against online threats.

Another way to do so is by implementing what’s called a Virtual Private Network, or VPN. A VPN adds another layer of security by implementing encryption. Basically, it protects your data by ensuring it’s traveling through a secure tunnel of sorts, shielding it from view by those who might be lurking in the shadows. A VPN is a staple of remote computing because it’s really the only way to make sure that your sensitive company data is being transferred as securely as possible. A VPN ultimately keeps you from spending even more money on potential data breaches, and is a considerable benefit when factoring in organizational mobility.

Does your business need a VPN to secure its data? Haber Group can help. To learn more, reach out to us at 866.625.3560.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 19 January 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Hackers Privacy Email Malware Business Internet Microsoft Hosted Solutions Windows 10 Computer Business Computing Backup IT Services Android Software Ransomware Smartphone Small Business User Tips Productivity Windows Google Hardware Network Security Data Management Mobile Devices Data Browser Facebook Office 365 Upgrade Smartphones Saving Money Business Continuity Internet of Things Gmail App Phishing Managed IT Services Remote Monitoring Efficiency Office Tips Cloud Computing IT Support Artificial Intelligence Workplace Tips Data Recovery Managed Service Provider Outsourced IT Encryption Microsoft Office Big Data Tip of the week Word Customer Service IT Support Innovation Two-factor Authentication Productivity Server Data storage Cybersecurity Money Government Disaster Recovery Employer-Employee Relationship WiFi Apple Spam Windows 10 Settings Miscellaneous Content Filtering Social Media Robot Risk Management Firewall Computing Virtual Private Network Passwords Google Drive End of Support Presentation Avoiding Downtime Hacker Office Managed IT Services IT Management LiFi Wireless Technology Recovery Telephone Systems Save Money Chrome Maintenance Analytics SaaS Bandwidth Data Backup Outlook Antivirus Search Unified Threat Management Monitors Administration Automation VoIP Safety Password Mouse The Internet of Things Mobile Device Network Hosted Solution Scam Tablet IBM Wireless YouTube Vulnerability communications Apps Holiday Customer Relationship Management Wi-Fi Hacking Business Management Printing Comparison Servers Politics BDR Cryptocurrency Running Cable 5G Virtual Desktop Title II Alerts Collaboration Techology Laptop Specifications Server Management Google Maps Bitcoin How To Information Technology Online Mail Merge Marketing File Sharing Google Docs Samsung Network Congestion Unified Threat Management Halloween Black Friday Statistics Websites Windows 8 IP Address Google Wallet Virtual Reality Microsoft Excel Address Quick Tips Computers Website User Error Scary Stories Cyber Monday Bluetooth Mobile Office Drones Blockchain Hard Drives Corporate Profile VoIP Display Printer Sports Smart Technology Social Mobile Device Management Education Permissions Refrigeration WannaCry Time Management Humor Deep Learning Public Speaking Access Control Distributed Denial of Service Digital Payment Cabling Hacks Lithium-ion battery Budget Augmented Reality Business Technology Data loss Network Management sip BYOD Bring Your Own Device SharePoint Buisness Managed IT Service Managed IT Fraud Infrastructure Fun IT solutions Undo Lenovo Digital Computer Care Touchscreen telephony Best Practice Communication Downloads Break Fix Application Shortcut Mobile Security Gadgets Disaster Vendor Management Virtualization Cortana Superfish Spyware Training Storage Business Growth Writing Multi-Factor Security Downtime Dark Web Patch Management Hotspot Users Automobile Uninterrupted Power Supply Current Events Legal Google Calendar Dark Data Alt Codes Retail Cybercrime Net Neutrality Language Solid State Drive Going Green How To Knowledge Networking Legislation User Heating/Cooling IT service Typing Social Engineering FCC VPN Computing Infrastructure Hard Disk Drive Firefox Operating System Unified Communications Competition Experience Data Security Tracking Health CCTV Alert Document Management Tech Support Electronic Medical Records Licensing Identity Theft Travel G Suite Notifications Supercomputer Botnet Upgrades Motion Sickness Taxes Crowdsourcing Domains IT Budget Machine Learning 3D Printing Update Emergency IT Consultant Relocation Unsupported Software Chromebook Meetings Cleaning Private Cloud Mobile Data Emoji Webcam Work/Life Balance Error Mobile Computing Black Market Point of Sale Law Enforcement Physical Security Twitter Paperless Office CrashOverride Staffing Gadget Administrator Personal Information Remote Computing Web Server GPS Computer Repair Cameras Processors