#Leadership#Australia#Telstra#Wi-Fi#Technology#SCAMwatch#Palo Alto Networks

Why a secure connection is critical when using Telstra's free Wi-Fi

Palo Alto Networks
|May 22|magazine10 min read

Organisations will be able to do business in more locations with Telstra’s 1,500 free Wi-Fi hotspots across Australia.

It’s important to optimise mobile device security measures for hotspot connectivity to ensure company data is protected when employees use public Wi-Fi.

As we previously discussed, cyber attacks can be very costly for businesses, potentially causing them to lose important data, suffer substantial financial losses, sustain reputational damage and even face lawsuits.

With National Consumer Fraud Week underway, SCAMwatch is asking Australians to think about the importance of protecting their personal information, while the Office of Fair Trading is urging people to get smarter with their data.

RELATED TOPIC: Telstra CEO David Thodey resigns: When will Andrew Penn take over?

Backing the government’s warnings, Gavin Coulthard, manager, engineering, Australia and New Zealand, Palo Alto Networks, said, “Traditional endpoint security measures may not adequately protect mobile devices against threats. Devices need to be secured before employees use public hotspots.”

According to Palo Alto Networks, there are three ways organisations can optimise mobile device security for public Wi-Fi hotspots:

1. Manage the device.

Organisations should properly configure security settings appropriate for public Wi-Fi connectivity. This lets the organisation safely deploy business applications and oversee device usage. Enterprise-scale device management capabilities can also simplify deployment and set-up by applying configurations common to all users, such as email account setting.

RELATED TOPIC: The Internet of Things comes to the enterprise

2. Protect the device.

Organisations can use endpoint security, mobile threat prevention technologies and next-generation firewalls to consistently enforce network policies. This prevents mobile devices from being compromised, and attackers from accessing the company’s data.

3. Control the data.

Data access and movement between applications should be controlled by the organisation. This can be achieved by enforcing precise policies that control network access to applications and data, particularly access to sensitive applications. These policies help to block unwanted applications, and prevent devices connecting to command and control servers.

RELATED TOPIC: How IT function has changed since aligning with business

Gavin Coulthard said, “Organisations can isolate and control business data and devices so that company data cannot be shared with unmanaged personal applications. This lets companies take advantage of free Wi-Fi without compromising on security.”

Let's connect!  

Check out the latest edition of Business Review Australia!