Recent Posts

Categories

See all

Archives

See all

5 Tips For Wi-Fi Security You Can Use

The use of Wi-Fi is now ubiquitous. Add the increasing use of Wi-Fi enabled devices and it would seem that there’s no business possible without the safe and accessible availability of the Internet through Wi-Fi. It doesn’t come without its challenges through. Here are at least 4 Wi-Fi Security tips you could use right away and help your business operate in safe environs:

WEP: What’s that?

If you are guilty of using WEP (Wired Equivalent Privacy), do know that it’s gone the way of the dodo a long time ago and for good reasons probably. The security protocol is vulnerable to say the least and is a juicy piece of meat for the hacker sharks out there. Even college geeks can break in and deploy chaos. You could use WPA2 (Wi-Fi protected Access) that comes with 802.1X authentication. We’d recommend even dial-up if you need the Internet so badly. Whatever you do, don’t use the WEP protocol. Replace the equipment if you have to but don’t like the dead dodo bite you.

802.1X client settings: Use them because it’s there and it’s good

The IEEE 802.1X standard is basically EAP (Extensible Authentication Protocol) redefined. Network World has an article with one great explanation for how this technology works . The technology is now the de-facto ever since the WEP has been sent to the shredder. The 802.1X protocol helps mitigate many risks associated with Wi-Fi networks, requires the use of unique keys for every session, and much more.

Wireless Intrusion Prevention: Set up your defense

The Wireless Intrusion prevention systems available today are there for a reason: it works. Not just for setting up an iron-spiked, electric fence around your wireless networks but also to prevent Denial-of-Service Attacks and suchlike. WIP systems work by monitoring networks and the airwaves and have features such as alerting you to possible attacks, rogue intrusions, malicious attacks, and any possible hacking attempts. What’s more, there are some open-source options available too.

NAP: It’s a network, so where’s the protection?

Sometimes, even the above-mentioned Wireless Intrusion protection systems and the 802.1X protocols won’t be enough for your needs. In such cases, you could always consider going for a Network Access Protocol (NAP) or Network Access Control (NAC) and gain more control over your networks. These technologies help you determine network access, regale to compliance, isolate problems and helps you to deploy remediation strategies promptly and effectively without crashing your network. You also get – in some cases – network intrusion prevention and detection features that help you to float out advanced wireless network protection.

Network Component Physical Security: it’s not always about software

Software is glamorous; hardware is boring. At least, that’s what most IT management folks tend to end up thinking thereby opening the vault door some of the most common attacks possible. Sometimes, it’s good to get way from the encryption and fancy technology and get our hands dirty. Simple things you could do is to have the access points stowed away up in the false ceilings, secure your network devices, and keep your server rooms locked at all times, etc.

Make sure your Wi-Fi networks are secure. If you need help, do feel free to talk to us.


← Older Next →

Recent Posts

Categories

See all

Archives

See all