Feeds

Mobile broadband or WiFi? You betcha

Horses for wireless courses

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Security blanket

Security is the most compelling issue to consider when assessing the pros and cons of WiFi versus mobile broadband. Security will (and must) take priority over all other factors, including cost: falling short is not an option. Public WiFi is under particular scrutiny on this score, thanks to some notorious examples of serious fraudulent activity.

Security measures that users should take when using public WiFi, include opting for more secure access points where available, ensuring that the PC firewall is switched on, disabling file and printer sharing, making files private (or even removing them), and encrypting data. Enterprises, by default, should ensure that employees' laptops are configured to optimise security when travelling. They should also issue staff with a check list of good practice.

Additionally, remote access vendors such as iPass protect WiFi hotspot access through a variety of security and authentication protocols, as well as helping to protect against rogue access points set up by crooks..

Mobile broadband is considered more secure than WiFi as everything is already encrypted through the mobile service provider’s network. This eliminates the need for configuring/enabling security settings on the laptop. Probably the only security issue with mobile broadband is loss or theft of the USB dongle or data card, and with it a user’s access credentials. This issue will disappear as mobile broadband is increasingly integrated into laptops.

The choice of connectivity today needs to take into account a whole range of factors, and we have tried to touch on the main ones. Some users may be served sufficiently by WiFi alone, and others by mobile broadband. Both markets are evolving, and ultimately, one may dominate the other, but for now, these should be viewed by both the user and the enterprise as complementary access options. Indeed, remote access specialists such as iPass and Fiberlink, along with traditional service providers already recognise and address this dual need.

We welcome your thoughts and experiences with wireless connectivity, along with any advice for individual users and enterprises. ®

Website security in corporate America

More from The Register

next story
Man buys iPHONE 6 and DROPS IT to SMASH on PURPOSE
Yarrrgh! 'Tis Antipodean insanity, ye crazy swab
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
4K-ing excellent TV is on its way ... in its own sweet time, natch
For decades Hollywood actually binned its 4K files. Doh!
Your chance to WIN the WORLD'S ONLY HANDHELD ZX SPECTRUM
Reg staff not allowed to enter, god dammit
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Monitors monitor's monitoring finds touch screens have 0.4% market share
Not four. Point four. Count yer booty again, Microsoft
DARPA-backed jetpack prototype built to make soldiers run faster
4 Minute Mile project hatched to speed up tired troops
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.