Mobile attacks and vulnerabilities are increasing. It’s plain to see. In 2017, there was a huge spike in the number of attacks that made into the news media. However, the attacks that make it to the cover The New York Times are only the tip of the iceberg, because the vast majority of attacks go unreported by the news media.
But cyber attacks can be very damaging all the same. Moreover, just one attack can result in significant financial or reputational damage to your business. The Equifax breach has not only had huge repercussions for Equifax, but the entire credit reporting industry is now reeling.
Although it often feels like there’s not a lot that you can do to secure your Wi-Fi connection, there is. For instance, we’ve spent a lot of time thinking really seriously about securing your Wi-Fi connection. Over the years, we’ve invested heavily in ruggedizing our solution to protect our users by overlaying various security technologies on top of our service.
Here are just five (of many) important ways we secure your Wi-Fi connection:
- We treat the whole service as an attack surface.
- We block all attack vectors.
- We secure the un-secure.
- We monitor and validate.
- We stay one step ahead.
Digging a little deeper: our approach to mobile security is to treat the whole service as a complete attack surface. We assume our users are in an insecure environment, because they most likely are, and we take every possible measure to mitigate potential attacks.
That means we’re thinking about end-to-end security – everything from the client side all the way through the access infrastructure and the infrastructure that we’re acquiring all the way up through into our platform and integration with our providers billing and authentication systems. We’ve analyzed and hardened each individual component in our service to block all possible attack vectors. We also look at our end-to-end infrastructure as well to identify and mitigate possible vulnerabilities.
Finally, the iPass platform continuously monitors and validates our global Wi-Fi footprint to ensure its authenticity.
We’ve got a lot of customers and partners around the world that have extremely stringent security requirements. They all have sensitive information, because nowadays everyone does, including personally identifiable information; and if that information is not properly secured, those companies are on the hook for it. So, here at iPass, we continuously monitor emerging threats to ensure continued security.