Why a secure connection is critical when using Telstra's free Wi-Fi

By Palo Alto Networks

Organisations will be able to do business in more locations with Telstra’s 1,500 free Wi-Fi hotspots across Australia.

It’s important to optimise mobile device security measures for hotspot connectivity to ensure company data is protected when employees use public Wi-Fi.

As we previously discussed, cyber attacks can be very costly for businesses, potentially causing them to lose important data, suffer substantial financial losses, sustain reputational damage and even face lawsuits.

With National Consumer Fraud Week underway, SCAMwatch is asking Australians to think about the importance of protecting their personal information, while the Office of Fair Trading is urging people to get smarter with their data.

RELATED TOPIC: Telstra CEO David Thodey resigns: When will Andrew Penn take over?

Backing the government’s warnings, Gavin Coulthard, manager, engineering, Australia and New Zealand, Palo Alto Networks, said, “Traditional endpoint security measures may not adequately protect mobile devices against threats. Devices need to be secured before employees use public hotspots.”

According to Palo Alto Networks, there are three ways organisations can optimise mobile device security for public Wi-Fi hotspots:

1. Manage the device.

Organisations should properly configure security settings appropriate for public Wi-Fi connectivity. This lets the organisation safely deploy business applications and oversee device usage. Enterprise-scale device management capabilities can also simplify deployment and set-up by applying configurations common to all users, such as email account setting.

RELATED TOPIC: The Internet of Things comes to the enterprise

2. Protect the device.

Organisations can use endpoint security, mobile threat prevention technologies and next-generation firewalls to consistently enforce network policies. This prevents mobile devices from being compromised, and attackers from accessing the company’s data.

3. Control the data.

Data access and movement between applications should be controlled by the organisation. This can be achieved by enforcing precise policies that control network access to applications and data, particularly access to sensitive applications. These policies help to block unwanted applications, and prevent devices connecting to command and control servers.

RELATED TOPIC: How IT function has changed since aligning with business

Gavin Coulthard said, “Organisations can isolate and control business data and devices so that company data cannot be shared with unmanaged personal applications. This lets companies take advantage of free Wi-Fi without compromising on security.”

Let's connect!  

Check out the latest edition of Business Review Australia!

Share

Featured Articles

Nirvik Singh, COO Grey Group on adding colour to campaigns

Nirvik Singh, Global COO and President International of Grey Group, cultivating culture and utilising AI to enhance rather than replace human creativity

How Longi became the world’s leading solar tech manufacturer

On a mission to accelerate the adoption of sustainable energy solutions, US$30 billion Chinese tech firm Longi is not just selling solar – but using it

How Samsung’s US$5billion sustainability plan is working out

Armed with an ambitious billion-dollar strategy, Samsung is on track to achieve net zero carbon emissions company-wide by 2050 – but challenges persist

UOB: making strides in sustainability across Southeast Asia

Sustainability

Huawei smartwatch goes for gold with Ultimate Edition

Lifestyle

How IKEA India plans to double business, triple headcount

Corporate Finance