Feeds

Mobile broadband or WiFi? You betcha

Horses for wireless courses

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Security blanket

Security is the most compelling issue to consider when assessing the pros and cons of WiFi versus mobile broadband. Security will (and must) take priority over all other factors, including cost: falling short is not an option. Public WiFi is under particular scrutiny on this score, thanks to some notorious examples of serious fraudulent activity.

Security measures that users should take when using public WiFi, include opting for more secure access points where available, ensuring that the PC firewall is switched on, disabling file and printer sharing, making files private (or even removing them), and encrypting data. Enterprises, by default, should ensure that employees' laptops are configured to optimise security when travelling. They should also issue staff with a check list of good practice.

Additionally, remote access vendors such as iPass protect WiFi hotspot access through a variety of security and authentication protocols, as well as helping to protect against rogue access points set up by crooks..

Mobile broadband is considered more secure than WiFi as everything is already encrypted through the mobile service provider’s network. This eliminates the need for configuring/enabling security settings on the laptop. Probably the only security issue with mobile broadband is loss or theft of the USB dongle or data card, and with it a user’s access credentials. This issue will disappear as mobile broadband is increasingly integrated into laptops.

The choice of connectivity today needs to take into account a whole range of factors, and we have tried to touch on the main ones. Some users may be served sufficiently by WiFi alone, and others by mobile broadband. Both markets are evolving, and ultimately, one may dominate the other, but for now, these should be viewed by both the user and the enterprise as complementary access options. Indeed, remote access specialists such as iPass and Fiberlink, along with traditional service providers already recognise and address this dual need.

We welcome your thoughts and experiences with wireless connectivity, along with any advice for individual users and enterprises. ®

Application security programs and practises

More from The Register

next story
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.