Public Wi-Fi networks prove to be cybersecurity threats
April 29, 2013
Improved access to builder construction software is one of the many benefits of a "bring your own device" (BYOD) policy at today's firms. However, employees who aren't safely using their smartphones, tablets and laptops in public could be putting important company information at risk. According to new research from provider of cybercrime prevention solutions ThreatMetrix, accessing sensitive data on public Wi-Fi networks could open up employee-owned devices to fraud and malware risks.
"Consumers can easily access public Wi-Fi networks from just about anywhere – and so can cybercriminals," said Dean Weinert , product manager at ThreatMetrix. "Cyber threats are certainly a reality at local coffee shops and other wireless hotspots. If consumers don't take extra precaution to protect their personal devices, they can unwittingly share sensitive information with cybercriminals interfering on the network."
Professionals must not feel safe using public Wi-Fi
Personal and corporate data is subject to cybercrime risks any time it is accessed on a public network, and construction executives need to train their employees to not put business information on mobile devices without protection. This is why all company BYOD policies must include regulations for acceptable use and mandatory downloads that can defend against cyberthieves. Construction firms are beginning to use the cloud an increasing amount, making it even more important to use the most integrated security solutions.
Lost devices can devastate a firm
Construction companies that have enacted a BYOD policy can be just as affected by a misplaced or stolen mobile device that isn't protected by the necessary security protocol than a cybercriminal infiltrating a firm's virtual infrastructure. The IDG News Service reported vulnerable smartphones and tablets cannot be controlled remotely and shut off by the firm in the event they wind up in the wrong hands.
"Loss or theft of an employee's gadget represents not a lesser threat to a company than malware infection," Konstantin Voronkov, group manager of systems management of mobile devices and virtual environments at Kaspersky Lab, told the news source. "The loss of a device leads to a corporate data leak which may have negative impact on business. That is why IT staff must be able to control data remotely, for example, by blocking the lost device or by deleting all the information and mail stored on it."