crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

A recent Wi-Fi security report from Wandera analyzed a set of 100,000 company-owned mobile devices and found that 74% of wireless data took advantage of a nearby Wi-Fi network. 12% of those Wi-Fi hotspots lacked any type of encryption to secure the connection. Furthermore, only 4% of these company-owned devices were exposed to accidental or deliberate “man-in-the-middle” attacks.

When we say a man-in-the-middle attack, we’re basically talking about a situation where one computer has contracted malware that allows another machine to steal data that’s flowing to and from it. Once the machine has connected to a Wi-Fi connection, the malware is then transferred to the network, thereby infecting the entire network with the malware and giving the hacker free rein to cause all kinds of trouble.

Surprisingly enough, cellular networks are much more secure than a normal Wi-Fi network, since cellular providers take advantage of encryption that protects users. Yet, even still, users will prefer to use a Wi-Fi connection over a cellular provider connection when given the choice. One statistic claims that up to 60% of people will simply connect to any public Wi-Fi they find rather than resort to their cellular data--even if it’s paid for by the company they work for. Symantec’s Wi-Fi Risk Report comes to a similar conclusion, claiming that people believe their data is more secure if it’s transmitted over Wi-Fi. 53% of people can’t even tell the difference between a secured network and an unsecured network, and 90% of consumers have put some type of personal information at risk using public Wi-Fi.

At the business level, the state of affairs shifts favorably. Individual Wi-Fi use still seems similar, but businesses do a much better job of securing a network from online threats and malicious users. A firewall is one of the best ways to do so, since it actively keeps threats out of your network by checking data that enters it. When a user is accessing your organization’s Wi-Fi, they can then access the entire network that’s hosted on it--including any servers or confidential information that’s found on it. By partitioning information behind the firewall, you’re making your business that much more secure against online threats.

Another way to do so is by implementing what’s called a Virtual Private Network, or VPN. A VPN adds another layer of security by implementing encryption. Basically, it protects your data by ensuring it’s traveling through a secure tunnel of sorts, shielding it from view by those who might be lurking in the shadows. A VPN is a staple of remote computing because it’s really the only way to make sure that your sensitive company data is being transferred as securely as possible. A VPN ultimately keeps you from spending even more money on potential data breaches, and is a considerable benefit when factoring in organizational mobility.

Does your business need a VPN to secure its data? Integrated Business Technologies can help. To learn more, reach out to us at (918) 770-8738.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 19 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Microsoft Saving Money Cloud Productivity Business Computing Workplace Tips Best Practices IT Services Backup Hackers Hosted Solutions IT Support Business Email Small Business Mobile Devices Malware Network Hardware Software Smartphones Data Communication Windows Server Upgrade VoIP Business Continuity Mobile Device Management Virtualization Microsoft Office Google Efficiency Disaster Recovery Mobile Office Computer Miscellaneous Vendor Management Gadgets Holiday Innovation Android Social Media Quick Tips Smartphone Windows 10 User Tips Mobile Computing WiFi BYOD Best Practice Outsourced IT Passwords Remote Monitoring Browser Bring Your Own Device Users Internet of Things The Internet of Things Trending Wireless Technology Operating System Apple Spam History Alert Firewall Managed IT services Network Security Content Filtering Remote Computing Going Green Managed IT Information Technology Current Events Data Backup Big Data Office Analytics Data Management IT Solutions Unified Threat Management Lithium-ion Battery Save Money IT Consultant Printer Artificial Intelligence Saving Time Gmail Avoiding Downtime Maintenance Hard Drives App Customer Relationship Management Facebook Windows 8 Ransomware Tech Support Humor Business Growth Apps Risk Management Application Virus Employer-Employee Relationship Customer Service Hacking Computers Fax Server Phone System Outlook Health Collaboration Two-factor Authentication Encryption Automation Marketing Excel Office Tips Antivirus Retail Phishing Data Recovery IT service Digital Payment VPN PowerPoint Cybersecurity Training Tablet Office 365 User Error Password iPhone Co-Managed IT Administration Presentation Budget Computer Repair Proactive IT Router Recovery Inbound Marketing Mouse Money Social Net Neutrality Running Cable Mobile Device Wireless Data storage Chrome File Sharing Save Time Cybercrime Social Networking Wi-Fi Robot Hiring/Firing Unified Communications Mobility Printing Display Alerts Redundancy End of Support LiFi Government Website Computing Project Management Help Desk Statistics Intranet Business Intelligence Competition Network Congestion Files Downtime Data Security Managed IT Services Augmented Reality Search Virtual Desktop USB Piracy Business Owner Sports Applications Hacker Point of Sale Programming Scam User Tip of the week Analyitcs Education Bandwidth Document Management Safety Specifications Licensing IBM Settings Hosted Solution Vulnerability Memory Unified Threat Management Laptop communications Hacks Wearable Technology Permissions Virtual Private Network Documents Conferencing Access Control Halloween SaaS Black Friday Entrepreneur Fraud Undo Macro PC Care 5G PDF Value People eBay SharePoint Scary Stories Cyber Monday Software Tips Internet Exlporer Remote Support Leadership New Additions Monitors Skype Streaming Media Deep Learning Print Server Gaming Console Text Messaging Downloads Telephony Smart Technology Mobile Security Domains Google Wallet Work Station Congratulations Networking Fun Writing LinkedIn Word Law Firm IT Video Surveillance Multi-Factor Security Distributed Denial of Service IT Support Hotspot Public Speaking Drones Windows 8.1 Update Recycling Cortana Social Engineering Best Available eWaste Buisness Identities Google Calendar Private Cloud Managed IT Service Language Backups Adminstration Techology Knowledge Environment CIO Solid State Drive Bluetooth 3D Legislation Public Cloud Break Fix Data loss Computing Infrastructure Legal Online Currency Samsung Debate Disaster Resistance Experience Compliance Troubleshooting Heating/Cooling Alt Codes Computer Accessories Sync Dark Web Windows 10 Consumers Crowdfunding IT Consulting Regulations YouTube Typing Software as a Service Mobile Device Managment Data Warehousing IP Address Google Drive Company Culture Twitter Scheduling Data Breach How To Refrigeration Cryptocurrency Disaster Touchscreen Technology Tips Productivity Microsoft Excel Google Docs Technology Laws Flexibility Cost Management Bitcoin Digital Signature Comparison Travel Blockchain

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...