Security tips for wireless technology

Security tips for wireless technology
Adesh Rampat

Applying wireless technology for networks promises a great many benefits: lower installation costs, easy mobility and more. That's why so many companies are using this technology, especially for their mobile users.

Because all mobile equipment, such as laptops and handheld devices, can perform wireless operations, you should make sure that users do not store information on these devices. The majority of users employ wireless technology for email, so locate all e-mail personal store files (pst) on the e-mail server.

The current move from circuit-switched communications to high-speed packet-based networks can also create security issues. With circuit-switched communications, the user has to dial in to the network to gain access, and the OS performs user-access verification. But with the new high-speed packet based networks, access to the network is always "on." With this type of network, user access should be verified by periodic password changes.

Other basic security practices to apply:

  • Use encryption software on all mobile devices.
  • Limit the number of users that will have wireless technology.
  • Become familiar with the wireless provider's security policy.
  • Make sure the network administrator is updated on wireless security.

Requires Free Membership to View

  • Check audit logs periodically for any security breaches.

Adesh Rampat has 10 years experience with network and IT administration. He is a member of the Association of Internet Professionals, the Institute for Network Professionals, and the International Webmasters Association. He has also lectured extensively on a variety of topics.

Did you like this tip? If so, (or if not) why not let us know. Send an email to us and sound off. Or visit our tips page to rate this tip, or submit one of your own.

Related Book

Wireless Network Deployments
Author : Rajamani Ganesh and Kaveh Pahlavan
Publisher : Kluwer Academic Publishing
Published : Jun 2000
Wireless Network Deployments provides practical engineering guidance for wireless and cellular engineers, researchers, technicians, and managers working in second and third generation digital wireless networks.

This was first published in April 2001

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.