Why a secure connection is critical when using Telstra's free Wi-Fi

By Palo Alto Networks

Organisations will be able to do business in more locations with Telstra’s 1,500 free Wi-Fi hotspots across Australia.

It’s important to optimise mobile device security measures for hotspot connectivity to ensure company data is protected when employees use public Wi-Fi.

As we previously discussed, cyber attacks can be very costly for businesses, potentially causing them to lose important data, suffer substantial financial losses, sustain reputational damage and even face lawsuits.

With National Consumer Fraud Week underway, SCAMwatch is asking Australians to think about the importance of protecting their personal information, while the Office of Fair Trading is urging people to get smarter with their data.

RELATED TOPIC: Telstra CEO David Thodey resigns: When will Andrew Penn take over?

Backing the government’s warnings, Gavin Coulthard, manager, engineering, Australia and New Zealand, Palo Alto Networks, said, “Traditional endpoint security measures may not adequately protect mobile devices against threats. Devices need to be secured before employees use public hotspots.”

According to Palo Alto Networks, there are three ways organisations can optimise mobile device security for public Wi-Fi hotspots:

1. Manage the device.

Organisations should properly configure security settings appropriate for public Wi-Fi connectivity. This lets the organisation safely deploy business applications and oversee device usage. Enterprise-scale device management capabilities can also simplify deployment and set-up by applying configurations common to all users, such as email account setting.

RELATED TOPIC: The Internet of Things comes to the enterprise

2. Protect the device.

Organisations can use endpoint security, mobile threat prevention technologies and next-generation firewalls to consistently enforce network policies. This prevents mobile devices from being compromised, and attackers from accessing the company’s data.

3. Control the data.

Data access and movement between applications should be controlled by the organisation. This can be achieved by enforcing precise policies that control network access to applications and data, particularly access to sensitive applications. These policies help to block unwanted applications, and prevent devices connecting to command and control servers.

RELATED TOPIC: How IT function has changed since aligning with business

Gavin Coulthard said, “Organisations can isolate and control business data and devices so that company data cannot be shared with unmanaged personal applications. This lets companies take advantage of free Wi-Fi without compromising on security.”

Let's connect!  

Check out the latest edition of Business Review Australia!

Share

Featured Articles

Hybrid live event shaping the future of Sustainability & ESG

Sustainability LIVE London returns for a two-day, multi-track conference programme featuring inspirational ESG speakers, debates and discussions

Nine must-attend sustainability events for business leaders

From London to Abu Dhabi, Singapore to San Diego, these sustainability-focused events are designed to help business leaders action their ESG goals

Daniel Weise of BCG on new supply chain and procurement book

Daniel Weise, global leader of Boston Consulting Group’s procurement business line, on the timely publication of his new book, Profit From The Source

Attract and retain talent with flexible working and benefits

Human Capital

Nurturing the next generation of women leaders in Africa

Leadership & Strategy

5 Mins With: Cybersecurity expert Ariel Parnes of Mitiga

Technology