Feeds

Is wireless security just a pipe dream?

Let us know

  • alert
  • submit to reddit

Boost IT visibility and business value

Reader Poll The security of Wi-Fi hotspots, cellular data connections and other mechanisms for connecting remotely is something that is becoming relevant to more and more organisations. While the advocates and scare mongers put their extreme points of view, what is actually happening on the front line?

So, we turn to you, our beloved readers, to tell it how it really is, out there in the wireless wild west. It should only take a few minutes, but will leave you with a feeling of immense satisfaction.

Access Security Poll

How comfortable are you with the security or ability to secure the following for business use?

  Inherently secure enough with no special measures Can secure adequately if special measures are taken Not secure enough for us even with special measures No opinion Special measures required
(if relevant)
Voice calls to and from a cellular handset
Notebook PC access over Wi-Fi hotspots
Notebook PC access over cellular (GPRS/3G/HSDPA)
Notebook PC access from typical home Wi-Fi and broadband setup
Notebook PC access from hotel fixed line services
Browser access from a public machine (e.g. internet cafe, hotel business centre)
BlackBerry on cellular
Symbian devices (for data access) over cellular
Windows Mobile devices (for data access) on cellular
Windows Mobile devices for data access over Wi-Fi hotspots
Skype calls to/from Wi-Fi hotspots
Other option important to you
Other option important to you

Are you aware of any actual security incidents caused by of any of the following in the past 12 months within your organisation?

  Yes Not to my knowledge Don't use Brief description if yes
Voice calls to and from a cellular handset
Notebook PC access over Wi-Fi hotspots
Notebook PC access over cellular (GPRS/3G/HSDPA)
Notebook PC access from typical home Wi-Fi and broadband setup
Notebook PC access from hotel fixed line services
Browser access from a public machine (e.g. internet cafe, hotel business centre)
BlackBerry on cellular
Symbian devices (for data access) over cellular
Windows Mobile devices (for data access) on cellular
Windows Mobile devices for data access over Wi-Fi hotspots
Skype calls to/from Wi-Fi hotspots
Other option important to you
Other option important to you

Are you?

Other :

Do you work for?

Other:

Where are you based?

The essential guide to IT transformation

More from The Register

next story
Déjà vu: Virgin Media jacks up broadband prices
Screw copper phone lines, we're UNIQUE, bleats telco
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
UK mobile coverage is BETTER than EVER, networks tell Ofcom
Regulator swallows this line and parrots it back out at us. What are they playing at?
What's the nature of your emergency, Vodafone?
Oh, you've dialled the wrong number for ad fibs, rules ASA
EE network whacked by 'PDP authentication failure' blunder
Carrier is 'aware' of cockup, working on a fix NOW
ROAD TRIP! An FCC road trip – Leahy demands net neutrality debate across US
You crashed watchdog's site, now time to crash its ears
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?