301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

A recent Wi-Fi security report from Wandera analyzed a set of 100,000 company-owned mobile devices and found that 74% of wireless data took advantage of a nearby Wi-Fi network. 12% of those Wi-Fi hotspots lacked any type of encryption to secure the connection. Furthermore, only 4% of these company-owned devices were exposed to accidental or deliberate “man-in-the-middle” attacks.

When we say a man-in-the-middle attack, we’re basically talking about a situation where one computer has contracted malware that allows another machine to steal data that’s flowing to and from it. Once the machine has connected to a Wi-Fi connection, the malware is then transferred to the network, thereby infecting the entire network with the malware and giving the hacker free rein to cause all kinds of trouble.

Surprisingly enough, cellular networks are much more secure than a normal Wi-Fi network, since cellular providers take advantage of encryption that protects users. Yet, even still, users will prefer to use a Wi-Fi connection over a cellular provider connection when given the choice. One statistic claims that up to 60% of people will simply connect to any public Wi-Fi they find rather than resort to their cellular data--even if it’s paid for by the company they work for. Symantec’s Wi-Fi Risk Report comes to a similar conclusion, claiming that people believe their data is more secure if it’s transmitted over Wi-Fi. 53% of people can’t even tell the difference between a secured network and an unsecured network, and 90% of consumers have put some type of personal information at risk using public Wi-Fi.

At the business level, the state of affairs shifts favorably. Individual Wi-Fi use still seems similar, but businesses do a much better job of securing a network from online threats and malicious users. A firewall is one of the best ways to do so, since it actively keeps threats out of your network by checking data that enters it. When a user is accessing your organization’s Wi-Fi, they can then access the entire network that’s hosted on it--including any servers or confidential information that’s found on it. By partitioning information behind the firewall, you’re making your business that much more secure against online threats.

Another way to do so is by implementing what’s called a Virtual Private Network, or VPN. A VPN adds another layer of security by implementing encryption. Basically, it protects your data by ensuring it’s traveling through a secure tunnel of sorts, shielding it from view by those who might be lurking in the shadows. A VPN is a staple of remote computing because it’s really the only way to make sure that your sensitive company data is being transferred as securely as possible. A VPN ultimately keeps you from spending even more money on potential data breaches, and is a considerable benefit when factoring in organizational mobility.

Does your business need a VPN to secure its data? Washington Works can help. To learn more, reach out to us at 301-571-5040.

Tip of the Week: How to Type Special Symbols
Hitman Email Scam Threatens Your Life, Instead of ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 22 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Business Computing Malware Hackers Privacy Email Network Security Software Business Backup Ransomware Productivity Microsoft Mobile Devices User Tips Android Smartphone Small Business Managed IT Services Google Windows 10 Internet Computer Managed Service Provider Office 365 Efficiency Cloud Computing Hosted Solutions Data Management Encryption Business Continuity Business Management Communication IT Services Smartphones Productivity Hardware Data Recovery Browser Disaster Recovery Social Media Tip of the week Server Outsourced IT Work/Life Balance Workplace Tips Remote Monitoring Save Money Phishing App Holiday Antivirus IT Support Hosted Solution Data Backup Windows Unified Threat Management Apps Cybersecurity Money Facebook Big Data Virtual Reality Innovation Risk Management How To Windows 10 SaaS Infrastructure Paperless Office Government BYOD Password IT Management Word Artificial Intelligence Saving Money Alert Health Document Management Samsung Tech Term Computing Two-factor Authentication Bandwidth Taxes Data Politics Managed IT Services Tech Support Identity Theft Websites Maintenance Business Technology Botnet Automation Employer-Employee Relationship HIPAA Chrome Mobile Security Collaboration Twitter Wi-Fi Scam Computer Care Robot Vulnerability Data loss Mobile Device Recovery Training File Sharing Remote Computing VPN Physical Security Hacker Telephone Systems Data Security Server Management Virtual Private Network Office Firewall Automobile Mail Merge Licensing IT Solutions Digital Tracking VoIP Mouse Gadget Techology Identity Emoji Bluetooth Microsoft Excel Hard Disk Drive Spam Travel Address Cooperation Upgrades Spyware Mobile Device Management Avoiding Downtime Tablet G Suite Unified Threat Management Electronic Medical Records Internet of Things Motion Sickness Staff Time Management Comparison Augmented Reality User Error Compliance Legal Blockchain Office Tips Notifications Gmail Social How To Network Management Specifications IT Consultant Regulations Sports Managed IT Permissions Budget Gadgets Supercomputer Meetings Wearable Technology Analytics Printer Touchscreen Black Friday IT Support Administrator Outlook Fraud Corporate Profile IT Budget Webcam Lenovo Access Control Cyber Monday Cabling Education Upgrade Machine Learning Black Market Shortcut Virtualization WannaCry Wireless Digital Payment Point of Sale Crowdsourcing Superfish Applications Firefox SharePoint Smart Technology Search Cleaning Relocation Patch Management Hotspot Monitors Staffing Downloads IT Technicians Personal Information Vendor Management Update Heating/Cooling Distributed Denial of Service Disaster Private Cloud Downtime Passwords Language Cortana Network Multi-Factor Security Web Server Networking Mirgation Servers Managed IT Service Uninterrupted Power Supply IBM Error Computing Infrastructure YouTube WiFi Google Calendar Microsoft Office Cameras Storage Computer Repair Quick Tips Chromebook Break Fix Customer Relationship Management Communications Cybercrime Processors Alerts Settings GPS Legislation CCTV Law Enforcement Chatbots Google Drive Statistics Dark Web Solid State Drive Mobile Office Domains Hard Drives Public Speaking CrashOverride Lithium-ion battery Emergency Safety The Internet of Things Hiring/Firing Competition Fun Users Miscellaneous VoIP Presentation 5G Wireless Technology Marketing IP Address Website Customer Service