Why a secure connection is critical when using Telstra's free Wi-Fi

By Palo Alto Networks

Organisations will be able to do business in more locations with Telstra’s 1,500 free Wi-Fi hotspots across Australia.

It’s important to optimise mobile device security measures for hotspot connectivity to ensure company data is protected when employees use public Wi-Fi.

As we previously discussed, cyber attacks can be very costly for businesses, potentially causing them to lose important data, suffer substantial financial losses, sustain reputational damage and even face lawsuits.

With National Consumer Fraud Week underway, SCAMwatch is asking Australians to think about the importance of protecting their personal information, while the Office of Fair Trading is urging people to get smarter with their data.

RELATED TOPIC: Telstra CEO David Thodey resigns: When will Andrew Penn take over?

Backing the government’s warnings, Gavin Coulthard, manager, engineering, Australia and New Zealand, Palo Alto Networks, said, “Traditional endpoint security measures may not adequately protect mobile devices against threats. Devices need to be secured before employees use public hotspots.”

According to Palo Alto Networks, there are three ways organisations can optimise mobile device security for public Wi-Fi hotspots:

1. Manage the device.

Organisations should properly configure security settings appropriate for public Wi-Fi connectivity. This lets the organisation safely deploy business applications and oversee device usage. Enterprise-scale device management capabilities can also simplify deployment and set-up by applying configurations common to all users, such as email account setting.

RELATED TOPIC: The Internet of Things comes to the enterprise

2. Protect the device.

Organisations can use endpoint security, mobile threat prevention technologies and next-generation firewalls to consistently enforce network policies. This prevents mobile devices from being compromised, and attackers from accessing the company’s data.

3. Control the data.

Data access and movement between applications should be controlled by the organisation. This can be achieved by enforcing precise policies that control network access to applications and data, particularly access to sensitive applications. These policies help to block unwanted applications, and prevent devices connecting to command and control servers.

RELATED TOPIC: How IT function has changed since aligning with business

Gavin Coulthard said, “Organisations can isolate and control business data and devices so that company data cannot be shared with unmanaged personal applications. This lets companies take advantage of free Wi-Fi without compromising on security.”

Let's connect!  

Check out the latest edition of Business Review Australia!


Featured Articles

Top 10 best-performing Australian companies: mines to banks

Among Australia’s largest companies by market cap are the country’s Big Four banks, a tech startup that successfully scaled, and two firms with female CEOs

Top 10 richest Southeast Asia: how they made their fortunes

From Singapore’s paint tycoon to Malaysia’s sugar king, we round up the 10 richest people in Southeast Asia – and investigate how they made their billions

Will moonlighting ever become accepted practice in India?

While not a new phenomenon, moonlighting has become a hot button issue across India with IT majors cracking down on it. Will the practice ever be accepted?

New YouTube CEO Neal Mohan joins surge of Indian-origin CEOs

Leadership & Strategy

Ex Infosys President Ravi Kumar is the CEO Cognizant needs

Leadership & Strategy

How India is bucking the global dealmaking downturn

Corporate Finance