Solved

tethering of phone and IPAD

Posted on 2015-01-12
11
115 Views
Last Modified: 2015-01-29
Can anyone give a beginners guide on what is meant by tethering a smartphone with a tablet? What would someone do that for? What are the risks? And how can you prevent it from happening?
0
Comment
Question by:pma111
  • 6
  • 4
11 Comments
 
LVL 7

Accepted Solution

by:
Network Zero earned 250 total points
ID: 40544365
Not sure what you mean by risks as long as you use wpa Just like a router you will be safe.  You need keep in mind how much data you have ️AVAILABLE depending on the device Internet will run out fast.


Here's a guide:

http://www.pcworld.com/article/240794/how_to_tether_your_iphone.html
0
 
LVL 3

Author Comment

by:pma111
ID: 40544370
by risks I was hinting at using a corporate mobile iphone device and tethered with a private iPAD... And how you can prevent employees abusing such a service...
0
 
LVL 3

Author Comment

by:pma111
ID: 40544378
In a nutshell we have had a few fairly high mobile phone bills (we have around 10 corporate iPhones for senior staff). We are trying to determine how the bills are so high, one suspicion was that employees are tethering iphones to private ipads and using that for internet connectivity at remote spots. Would there be anyway to prove this? If so, how? And would that evidence be on the iPad or iPhone?
0
 
LVL 4

Assisted Solution

by:Joeteck
Joeteck earned 250 total points
ID: 40544388
You have to manually turn it on at the phone. Verizon family plans have it enable..

Android: settings > More settings > Mobile hotspot

Click it to make changes, such as SSID, type of security, and passphrase. Then enable it..

Its just as  secure as a regular AP for your home.  Weak phase phrase, the more vulnerable you are.
0
 
LVL 3

Author Comment

by:pma111
ID: 40544398
Not really coming at this from a security angle - more a misuse angle. I.e. if you have a corporate smartphone (iphone), and use it as a hotspot for browsing the Internet for personal use with say a personal laptop/tablet. How can you prevent this? How can you prove this took place?
0
3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

 
LVL 3

Author Comment

by:pma111
ID: 40544403
the best way would be - can you disable the ability to use a company smartphone as a hotspot/for tethering, would this be done on the phone itself, or by the mobile network operator/provider?
0
 
LVL 4

Expert Comment

by:Joeteck
ID: 40544406
You may need to put a data cap on the device. Verizon has that feature if enabled. Plus Look at the amount of data used per device..
0
 
LVL 3

Author Comment

by:pma111
ID: 40544413
>Plus Look at the amount of data used per device..

How and where?
0
 
LVL 4

Expert Comment

by:Joeteck
ID: 40544497
On the device and on Verizon/ATT/SPRINT website. If its corporate you'll have those options.. Call your representative and get more information
0
 
LVL 3

Author Comment

by:pma111
ID: 40544512
so just to clarify, if say for example you setup an iphone as a hotspot, and you connected your ipad to it, and streamed movies or whatever, that is all adding to the data used by the iphone, and would show as such on bills etc?
0
 
LVL 4

Expert Comment

by:Joeteck
ID: 40544525
It will not show what they did, but how much data was used. You'll needed to log-in to your corporate control panel (if enabled) to get detailed information what was done. You can install a third party app that can monitor as well. Called "Data manager" works very well, and gives you detailed information on what was used and when. I have it on my iPad and my Note 2.  I hope to god they are not streaming movies... 2 movies can easily hit 3 gig in a few hours..
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
maxBlock challenge 30 112
Mobile phone 15 110
bunnyEars2 challenge 6 108
2011 iMac won't automatically go into sleep mode 10 66
A lot of new and distinct gadgets are making their appearance every other day. The latest gadget that has wooed the attention of all gadget lovers and non gadget lovers alike is the Smartwatch. This tiny gadget is capable of offering live access to …
The case of the missing phone talks about the way a small electronic gadget (the mobile phone) has penetrated into our lives and has made us addicted to it.
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

29 Experts available now in Live!

Get 1:1 Help Now