Commuters Putting Company Data at Risk over Free Public Wi-Fi

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9
Previous Next

Click through for findings from a survey on commuter usage of free public Wi-Fi, conducted by Opinion Matters on behalf of GFI Software.

GFI Software recently announced the findings of an extensive independent research project looking at end-user use of mobile devices at work and in their daily commute to and from the workplace, which revealed that commuters are using free, unsecured and unknown Wi-Fi services for accessing sensitive company data in greater numbers.

The survey of 1,000 U.S. office workers with a tablet or smartphone who travel to and from work on a train, bus or subway was conducted by Opinion Matters for GFI Software, and revealed that not only are employees using mobile devices and accessing data services during their daily commute, they are also increasing the risk of data security issues for their employers.

95.6 percent of survey respondents acknowledged that they used open, public Wi-Fi connections at least once a week to carry out work-related tasks such as sending and receiving email, reviewing and editing documents and accessing company servers. More than one-third (34.2 percent) of those respondents reported they accessed public Wi-Fi at least 20 times per week during their commutes, with some employees saying they connect more than 70 times per week. This activity puts company data and passwords at risk from packet sniffing and other forms of traffic interception.

“The research findings reveal a stark and concerning trend among commuters – one of using their personal devices to catch up on work during their commuting downtime, but doing so over highly insecure Internet connections that can be easily intercepted by other users or the operator of the access point,” said Walter Scott, CEO of GFI Software. “Mobile Internet access is now firmly entrenched as a day-to-day norm, but with that has come an increasingly relaxed user attitude to data security, compliance and data governance policy. Companies need to address mobile device management to ensure that use in insecure environments doesn’t create vulnerabilities that could be exploited by criminals – both cyber and conventional.”

 

Related Topics : In Their Own Words: The Four Dark Horses for the Third Major Mobile OS Speak, HTC, Mobile Search, 3G, Location-Based Services

 
More Slideshows

mobile54-190x128 Five Ways to Stay Productive While Working Remotely

There's no magic bullet, but the essentials are to make sure to have the right tools at your disposal while on the move to communicate with your teams in ways that fit your needs, as well as being flexible, clear and direct in your communication. ...  More >>

HealthGadgets2015Feb0x Twenty Innovative New Health Gadgets

Innovative developers recognize the fact that it's not always easy to stay on track with health and fitness goals and have begun creating gadgets and gizmos that are easy to plug into our always-on, mobile lives. ...  More >>

FonalityFCCBroadband0x How the FCC's Redefinition of Broadband Will Kill Cubicle Culture

Many fear-driven employers still keep workers caged in a single office building, but with broadband connection speeds more readily available than ever, employee demand will soon reach a breaking point. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date