Security tips for wireless technology
Applying wireless technology for networks promises a great many benefits: lower installation costs, easy mobility and more. That's why so many companies are using this technology, especially for their mobile users.
Because all mobile equipment, such as laptops and handheld devices, can perform wireless operations, you should make sure that users do not store information on these devices. The majority of users employ wireless technology for email, so locate all e-mail personal store files (pst) on the e-mail server.
The current move from circuit-switched communications to high-speed packet-based networks can also create security issues. With circuit-switched communications, the user has to dial in to the network to gain access, and the OS performs user-access verification. But with the new high-speed packet based networks, access to the network is always "on." With this type of network, user access should be verified by periodic password changes.
Other basic security practices to apply:
- Use encryption software on all mobile devices.
- Limit the number of users that will have wireless technology.
- Become familiar with the wireless provider's security policy.
- Make sure the network administrator is updated on wireless security.
- Check audit logs periodically for any security breaches.
Adesh Rampat has 10 years experience with network and IT administration. He is a member of the Association of Internet Professionals, the Institute for Network Professionals, and the International Webmasters Association. He has also lectured extensively on a variety of topics.
Did you like this tip? If so, (or if not) why not let us know. Send an email to us and sound off. Or visit our tips page to rate this tip, or submit one of your own.
Wireless Network Deployments
Author : Rajamani Ganesh and Kaveh Pahlavan
Publisher : Kluwer Academic Publishing
Published : Jun 2000
Wireless Network Deployments provides practical engineering guidance for wireless and cellular engineers, researchers, technicians, and managers working in second and third generation digital wireless networks.