Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Which is More Secure, Your Mobile Network or Wi-Fi?

Which is More Secure, Your Mobile Network or Wi-Fi?

For the modern business, having a strategy to manage your employees smartphone use is essential. This is because most of the people that work for you have smartphones. One study shows that upwards of 90 percent of people under 30 own a smartphone. If you have any design on running a business, or employing millennials (who are the largest generation in the current workforce), you’ll need to know what you are doing to protect your business from the increasing amount of threats that are out there targeting smartphones.

An annual Wi-Fi Security Report conducted by Wandera found that, out of a sample of 100,000 corporate-owned mobile devices, 74% of wireless data was transferred using a Wi-Fi network, 12 percent of Wi-Fi hotspots used by those people are open and lacking encryption, and only four percent of these corporate-owned devices have been exposed to malware through an accidental or deliberate man-in-the-middle attack.

The man-in-the-middle attack (MiTM) is one where a computer will pick up malware that allows an intermediary to intercept files and correspondence between the two machines, and upon connecting to a network via a Wi-Fi connection, transfers the malware onto the computing network--thus infecting the network with the malware that allows the hacker to intercept any communication.

It’s largely understood that cellular networks are more secure than Wi-Fi networks, as cellular networks utilize high-end encryption techniques. This doesn’t make them popular, however. People will typically use Wi-Fi that is available. In fact, one statistic suggests that people are so addicted to the use of Wi-Fi that upwards of 60 percent of people will connect to any available public Wi-Fi rather than use the cellular data, even if they don’t pay for it themselves. Symantec’s Wi-Fi Risk Report corroborates this notion, adding that roughly the same number of people believe their personal information is more secure transmitted over Wi-Fi, and that 53 percent cannot tell the difference between a secure and unsecure Wi-Fi network. The report goes on to state that nearly nine out of ten consumers have put their information at risk by using public Wi-Fi.

At the business level things get a little better. While individual Wi-Fi use remains similar, businesses typically do a much better job of securing their network to keep malicious entities out. One way they do this is by setting up a firewall to keep their Wi-Fi networks away from the rest of their network. Typically, when a person accesses your organization’s Wi-Fi, they are then able to access your whole entire network. If your servers and other confidential data are linked to your organizational Wi-Fi, then an intruder who can manage to connect will then have access. By separating your Wi-Fi from your network behind a firewall, you will not only protect yourself from ambitiously malignant people on your network, but also go a long way toward safeguarding your network from cyber attacks in general.

Another way that the business can ensure their mobile strategy won’t hamstring their company’s network is by instituting a Virtual Private Network (VPN). The VPN brings additional encryption to data communication by creating a secure tunnel in which to transfer data. For the small business a VPN has become an almost essential part of providing your staff with a workable remote computing situation. Not only does it work to secure your business’ data while using available remote connections, it makes it easier to scale a business by allowing new systems to connect to it with minimal configuration. In doing so, the deployment of a strategic VPN reduces capital investment and is a major benefit for organizational mobility.

If you haven’t already, your business is going to have to address your mobile security before it gets burned. If you would like to learn more about what you are up against, or how you can utilize today’s security technology to protect your business’ important data, call Decatur Computers Inc. today at 217-475-0226.

Tip of the Week: Why You Should Reconsider Your Be...
These Gifts Can Come with Security Issues
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Hackers IT Support Business Computing Cybersecurity Android Tech Term Internet Google Smartphone Business Management Malware User Tips Ransomware Software Backup Email Small Business Managed IT Services Windows 10 Data Recovery Artificial Intelligence Innovation Productivity Data Phishing Communications Cost Management Data Backup Efficiency Business Technology Cloud Cybercrime IT Management Business Outsourced IT Data Security Encryption Hard Drive Update Managed IT Services Saving Money Blockchain App Antivirus Hardware Mobile Device Management IT Services Collaboration Patch Management Gadgets Network Computer Access Control Mobile Device Office 365 Microsoft Data Breach Law Enforcement Passwords Start Menu Windows Applications Browser VPN Server Operating System Internet of Things Data Management Facebook Bitcoin Maintenance Disaster Recovery Remote Monitoring Social Engineering BDR Microsoft Office Data Protection Alert Gmail Spam Vulnerabilities Word Document Management Automation Digital Apps Bandwidth Holiday Scam Websites Laptop SaaS Smartphones Money Data loss Social Media Search Tech Terms Business Continuity Hacking Touchscreen Project Management Save Money Devices Google Drive Legal Emails Upgrades Virus Downtime Big Data Going Green Backup and Disaster Recovery Managed Service Provider Google Maps Compliance Telephony Hard Drive Disposal Downloads Bluetooth Piracy YouTube Specifications Microsoft Excel Download Running Cable Emergency Regulations WiFi VoIP email scam Solid State Drive VoIp Wireless Headphones Telephone Systems Software License Settings Television Cryptocurrency Upload Printer Cabling Vulnerability Mobile Security IT Support Audit Accountants Wireless Mobile Devices Mobility Cleaning Consultant Administration Mouse Trends Paperless Office DDoS Two-factor Authentication Training Time Management eWaste Corporate Profile Uninterrupted Power Supply Computers Managed IT Information Technology Password Gamification Database Worker Multi-factor Authentication Computer Care Equifax Robot Google Calendar Nanotechnology Mobile Technology Excel Tactics Cloud Computing Device security Samsung History Startup Unified Threat Management Unified Threat Management Outlook Augmented Reality SharePoint Vendor Mangement Tip of the week Content Addiction Disaster Website IBM Computing Infrastructure Google Docs Screen Reader Hosted Solutions Virtual Reality Automobile Access Distributed Denial of Service Business Mangement Machine Learning Unified Communications Legislation Best Practice Networking Budget Communication Employer-Employee Relationship Redundancy Company Culture Spyware Freedom of Information HTML Cortana Knowledge Printing Virtualization Unsupported Software Software as a Service Business Cards Tablet News Network Management Conferencing Identity Theft Analytics Virtual Assistant Government Apple How to Fake News Service Level Agreement Comparison Chromebook Desktop Windows 10 Twitter Marketing CrashOverride Managing Stress Multi-Factor Security BYOD Office Users Office Tips

Latest Blog

IT support is one of the most important parts of any modern business simply because it’s just not feasible to run a business without any form of technology at its core. For example, most businesses rely on email and other forms of communication, whereas stores might require ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.