ALL >> Business >> View Article
Beginners Guide To Wireless Security
Your Guide to Wireless Security =
This is the way the world is going and the hackers and criminals are doing their usual nefarious deeds.
These are the threats to your business and some tips on how to combat them.
The Threats
Some but not all of the tactics that the bad guys deploy to do you damage
Roaming Attackers: Attackers don't have to be located on a business's premises in order to access data on a wireless network. Criminals use network scanners, with a laptop or other portable device to sniff out wireless networks from a moving vehicle. This activity is called "wardriving". The same task performed while walking is called warwalking".
Hidden Access Points: A hidden access point is one that exists without the permission or knowledge of the wireless network's owner. These are often installed by employees to create hidden wireless networks that circumvent any installed security measures.
Evil Twin: Sometimes referred to as Wi-Phishing, an evil twin is a hidden access point that hides under a nearby network's name. The Evil Twin waits for an unsuspecting user to sign into the ...
... wrong access point and then steals the individual's data or attacks the computer. What fun these idiots have!
Network Resource Theft: Freeloading to you and me. This is a business or individual located nearby and logging onto your network for free. It's a bit like hanging out my washing on your line to save me the cost of the rope.
Protection Methods
Lots of ways have sprung up to protect wireless networks. Here are some of the best known ones
Firewalls: A properly configured, network firewall can effectively block intruders trying to enter a business's network via a wireless device.
Security Standards: The first security standard named WEP (Wired Equivalent Privacy) was insecure and easily compromised. Newer specifications, such as WPA, WPA2 and IEEE 802.11i are much stronger security tools. Businesses with wireless networks should take full advantage of a least one of these technologies. Ask an expert rather than enhance your life by learning this yourself, is my suggestion
Vulnerability Scanning: Use a network scanner yourself (just like the bad guys do) to uncover attacker-exploitable weaknesses in your wireless network, such as unsecured access points.
Education: All employees should be trained in the proper use of wireless devices and instructed to report any unusual or suspicious activities they detect.
For more information and advice on wireless security please feel free to visit our website.
Lyndon R. Ogden is an advisor to Your IT Genie experts in remote support and network security.
Add Comment
Business Articles
1. Lucintel Forecasts The Global Floral Perfume Market To Grow With A Cagr Of 6.8% From 2024 To 2031Author: Lucintel LLC
2. Lucintel Forecasts The Global Flip Flop Market To Grow With A Cagr Of 3.9% From 2024 To 2031
Author: Lucintel LLC
3. Best Manual Toothbrush In Uae: A Complete Guide To Smarter Oral Care Choices
Author: Smile Cart
4. Boost Your Tour Travel And Adventure Company With Expert Web Design And Seo Digital Marketing Services In Spain
Author: Vikram kumar
5. Lucintel Forecasts The Global Eye Shadow Market To Grow With A Cagr Of 6.2% From 2024 To 2031
Author: Lucintel LLC
6. Lucintel Forecasts The Global Comic Book Market To Grow With A Cagr Of 6.6% From 2024 To 2031
Author: Lucintel LLC
7. How Optical Prototyping Services In Spain Support Product Development
Author: Fotonica Gileyva
8. How Complex Optical Design In Madrid Supports High-tech Industries
Author: Fotonica Gileyva
9. Lucintel Forecasts The Global Coffee Beauty Product Market To Grow With A Cagr Of 5.9% From 2024 To 2031
Author: Lucintel LLC
10. Plaster Sand (plastering Manufactured Sand) Vs River Sand
Author: DOCTORSAND
11. How To Select The Right Chemical Injection System Suppliers For Oil & Gas Operations
Author: Priyadharshini
12. Lucintel Forecasts The Global Cc Cream Market To Grow With A Cagr Of 7.1% From 2024 To 2031
Author: Lucintel LLC
13. Maximizing Brand Growth: Why Dubai Businesses Are Partnering With Specialized Social Media Agencies
Author: Al murooj solutions
14. Create Your Website Easily With Host Sonu: A Step-by-step Tutorial
Author: contentcaddy
15. Unlock Power: Host Sonu Vps 8 Vcpu 16 Gb Ram Plan Explained
Author: contentcaddy






