Mobile broadband is entirely different from wireless broadband also termed sometimes as Wireless Internet. It uses the mobile phone technology for transmitting and securing data. The greatest advantage is that users do not need a fixed phone line service, Ethernet cable and broadband modem or router. Its just a USB device identified using a mobile number and can be directly plugged in to the computer.
Mobile broadband services do not require any manual software installation or any configuration changes in the computer as it is done for cable brodband. Instead the device installs the software automatically when it is connected to any computer. This can also be a disadvantage if you lose the device or if it is stolen as any one can use it in his computers. Some modems have an option to set a password by which the access to the modem can be locked and avoid others from using it. But it is important to inform the broadband service provider to cancel or suspend the connection, if the device is stolen or lost and prevent further billing.
Since wireless connection does not require any physical medium to connect to a computer it is vulnerable to hacking. But the hackers job will not be that easy since these mobile broadband devices use only a local IP address similar to a office network. The actual IP address is hidden behind a firewall and any external communication will be done using a local IP address. So if some one tries to hack the mobile broadband device the access will be denied or will not be successful since they receive only a false IP address. However access to the Internet or remote access of computers will be quite normal. Any data which is transmitted to the computer using a mobile broadband device has a 128 bit encryption in a GSM mobile network which is similar to WAP or WEP security in a wireless connection.
Although the access seems to be wireless the connection will not be scanned by any other wireless networks like what is done in a WI-fi zone or hot spots. Customers can use antivirus or Internet security softwares to protect from accessing their computer. Also users can regularly check the usage from the online account to keep track of any unauthorised usage. In the future, broadband service providers are expected to use the upcoming technology called 4G or 4th generation service, which provides much faster and secure access to the Internet.