KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Which is More Secure, Your Mobile Network or Wi-Fi?

Which is More Secure, Your Mobile Network or Wi-Fi?

For the modern business, having a strategy to manage your employees smartphone use is essential. This is because most of the people that work for you have smartphones. One study shows that upwards of 90 percent of people under 30 own a smartphone. If you have any design on running a business, or employing millennials (who are the largest generation in the current workforce), you’ll need to know what you are doing to protect your business from the increasing amount of threats that are out there targeting smartphones.

An annual Wi-Fi Security Report conducted by Wandera found that, out of a sample of 100,000 corporate-owned mobile devices, 74% of wireless data was transferred using a Wi-Fi network, 12 percent of Wi-Fi hotspots used by those people are open and lacking encryption, and only four percent of these corporate-owned devices have been exposed to malware through an accidental or deliberate man-in-the-middle attack.

The man-in-the-middle attack (MiTM) is one where a computer will pick up malware that allows an intermediary to intercept files and correspondence between the two machines, and upon connecting to a network via a Wi-Fi connection, transfers the malware onto the computing network--thus infecting the network with the malware that allows the hacker to intercept any communication.

It’s largely understood that cellular networks are more secure than Wi-Fi networks, as cellular networks utilize high-end encryption techniques. This doesn’t make them popular, however. People will typically use Wi-Fi that is available. In fact, one statistic suggests that people are so addicted to the use of Wi-Fi that upwards of 60 percent of people will connect to any available public Wi-Fi rather than use the cellular data, even if they don’t pay for it themselves. Symantec’s Wi-Fi Risk Report corroborates this notion, adding that roughly the same number of people believe their personal information is more secure transmitted over Wi-Fi, and that 53 percent cannot tell the difference between a secure and unsecure Wi-Fi network. The report goes on to state that nearly nine out of ten consumers have put their information at risk by using public Wi-Fi.

At the business level things get a little better. While individual Wi-Fi use remains similar, businesses typically do a much better job of securing their network to keep malicious entities out. One way they do this is by setting up a firewall to keep their Wi-Fi networks away from the rest of their network. Typically, when a person accesses your organization’s Wi-Fi, they are then able to access your whole entire network. If your servers and other confidential data are linked to your organizational Wi-Fi, then an intruder who can manage to connect will then have access. By separating your Wi-Fi from your network behind a firewall, you will not only protect yourself from ambitiously malignant people on your network, but also go a long way toward safeguarding your network from cyber attacks in general.

Another way that the business can ensure their mobile strategy won’t hamstring their company’s network is by instituting a Virtual Private Network (VPN). The VPN brings additional encryption to data communication by creating a secure tunnel in which to transfer data. For the small business a VPN has become an almost essential part of providing your staff with a workable remote computing situation. Not only does it work to secure your business’ data while using available remote connections, it makes it easier to scale a business by allowing new systems to connect to it with minimal configuration. In doing so, the deployment of a strategic VPN reduces capital investment and is a major benefit for organizational mobility.

If you haven’t already, your business is going to have to address your mobile security before it gets burned. If you would like to learn more about what you are up against, or how you can utilize today’s security technology to protect your business’ important data, call KT Connections today at 605-341-3873.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy hackers Email malware Business Computing Network Security Cloud Internet Google software User Tips Business Ransomware Efficiency Backup Data Small Business IT Support Mobile Device Management IT Support Microsoft Computer Android Facebook Hardware Phishing Productivity Smartphone Network Windows Hosted Solutions Gmail Managed IT Services Mobile Devices cybersecurity Money VoIP Alert Artificial Intelligence Microsoft Office Data Security IT Management communications Windows 10 Data Management Internet of Things Business Continuity Operating System Cloud Computing Antivirus Managed IT Services Networking Robot Smartphones Update Outlook Bandwidth IT Services Hard Drive Cost Management Outsourced IT Unified Communications Data storage Social Media Upgrade Passwords security cameras Business Management Communication Disaster Recovery BDR Nextiva Encryption End of Support data breach vulnerability Office 365 Apple Cryptocurrency Innovation News Digital Events Law Enforcement Data Backup Access Control Data Protection Word botnet Hacking Event Marketing Big Data Patch Management Local Buzz The Internet of Things Apps Gadgets South Dakota BYOD Automation vulnerabilities Analytics Project Management Holiday WiFi security solutions YouTube Collaboration Social Engineering Google Wallet IoT Firewall Best Practice Google Docs Server Legal Remote Monitoring Productivity Spam Customer Service Search IBM Drones Google Maps Windows 10 Browser Scam History Lunch and Learn Information Security Politics Bitcoin Data Recovery Start Menu Save Money SaaS Saving Money Document Management App Information Technology Tech Terms Webcam Uninterrupted Power Supply Vendor Mangement Writing Comparison Touchscreen botnet attack Government camera LastPass Microsoft Bookings Excel Cabling Business Mangement Budget Cleaning communication device Remote Computing Specifications Black Market Websites Penetration Testing Virtual Reality macbook Access booking process Tip of the week Hack Corporate Profile business owner Retail Television Programming Software as a Service DDoS attacks Phishing Scams Worker Spyware Rebrand Social Memory Event Virtual Assistant Redundancy Audit Cloud Backup Google Drive Solid State Drive communication solutions Education Mouse Business Growth Rapid City Virus File Sharing IT Consultation DDoS Web Servers Virtualization security precautions Applications identity theft Mixer Mobile Device Experience Network Congestion Maintenance Virtual Machines Telephony Local Technology Deep Learning Dell ’s Sonicwall Global Management System Physical Security Microsoft Office 365 SharePoint IoT Devices Law IT Workers IT Assessment Internet 101 Cache Tips and Tricks media experience Vendors Hard Drive Disposal Sports Managed Service Provider Office Fortinet Risk Creep VoIP Unified Threat Management Sales Tax Wireless Technology Password LiFi Microsoft Office 365 features IT Security Lawyers How To Samsung IT Strategy Internet Connected Devices information Community Involvement email scam Emergency Streaming Media Vendor Management Business Security IT for Oil Companies Society face Visible Light Communication Freedom of Information Laptop IT Solutions Tablets Administration Communications Flash Download eWaste Business Technology Windows XP Monitors Printing Risk Management Time Management Mobility Windows 8 enterprise productivity software surveillance cameras Business Cards Website Cortana Fake News Hosted Solution Tablet Attorneys Content Filtering Phone System Settings healthcare Computing Infrastructure Compliance Disaster Displays Downloads Kaseya Unified Threat Management Tech Support Trend Micro password manager LastPass AtomBombing Advertising Microsoft Excel SOX Managed Services Managed IT Distributed Denial of Service Hardware as a Service tool Workplace Tips Virtual Desktop Google Calendar Proactive IT Kaseya Connect Printer Fast food Google Play Store Cybercrime user confidence Computer Care Bluetooth appointment Quick Tips Sarbanes-Oxley Act HaaS Office Tips Knowledge Business Communications Music Conference Business Comunications Email Security Chamber of Commerce Safety Blockchain End User Testing VPN Running Cable Press Release Private Cloud Training Miscellaneous Microchip Playbook Piracy Books In Internet of Things Motion Sickness Employer Employee Relationship Digital Payment breach methods Software License Telephone Systems Reading Machine Learning Hiring/Firing Taxes Public Cloud Health Bring Your Own Device Banking Relocation Administrator Hacker Paperless Office 3D Printing base infrastructure Users Hacks Automobile security solution Work/Life Balance Notifications CCTV Business Metrics Phone Systen end-of-support date holiday season IT service Web Server Wi-Fi Rental Service collaboration capabilities Chromebook UTM Flexibility Meetings holidays Ordinary Computers Emails Documents CrashOverride Threat management Reliable Computing Marketing scammers Tracking Text Messaging quantum computers Protection PDF Twitter Scalability Supercomputer Computing scams G Suite Computer Malfunction Travel IT Consultant Language Processors Employer-Employee Relationship network security professionals Downtime Messenger Sync