Understanding Wireless Security
There is no denying how beneficial wireless technologies have become. We rely on them on a daily basis to keep us connected to the Canadian business market throughout mobile phones, laptops, and tablets.
Wireless technology has become an ingrained part of how professionals conduct business, regardless of their trade. Wireless technologies have opened the door to new possibilities.
It has enabled professionals to not only be more efficient and productive; it has also enhanced our ability to effectively communicate no matter where we are in the world. Therefore, we can send and receive information and have conversations with business partners and clients on many different platforms and devices at all times.
However, the convenience created by wireless technologies does have one major fall back, wireless connections are more prone to security issues such as tapping into conversations, interrupting transmissions, and compromising confidential information.Understanding wireless security
As more and more companies opt for wireless communications, the need and importance of wireless security has continued to grow over the past decade. Therefore, many IT departments are changing their security capabilities to accommodate both wireless and wired security.
In the same sense as more traditional forms of computer technologies, wireless security is primarily concerned with protecting an organizations computer network from unauthorized users who access the system to damage or extract confidential information. These threats can come in the form of computer viruses, malware, or from people attempting to hack into the system.
In recent years, a very public security breach, the hack of the PlayStation 3 network, has gained notoriety in the media as thousands of users had their personal account information exposed. Unsuspecting people had their credit card, contact information, and password information compromised seemingly overnight. You never know when a security breach may occur. Types of wireless technology security threats
There are many different ways that an organizations wireless network can be compromised. It can be attacked by a number of methods. Here are some of the most common:
Step to secure wireless connections
- Identity theft: This occurs when an outside source listens in to a conversation over a wireless network and gain access to information that allows them to access network information. To combat this, most systems have a filtering system that only allows authorized computers to gain access.
- Denial of service: This occurs when an unauthorized user purposely get legitimate users locked out of their computer system by entering numerous incorrect login attempts to lock the system, possibly causing a system crash.
- Malicious association: This occurs when unauthorized users utilize wireless networks to connect to an organizations computer network. To gain access they develop software that enables their wireless card to look like a real access point for the company network.
- Bluetooth: Using Bluetooth is a security threat. Users are more prone to attacked when they use Bluetooth enabled devices.
- Peer to peer networks: These networks pose a great threat because there is no access point between the devices being used. For protection, users can encrypt data they send over these networks.
With so many people using wireless technologies, there are countless ways for your personal and business networks to be hacked. However, there are a number of preventative steps that companies and professionals can take to reduce their risk of their connection being compromised:
- Secure your wireless router with a unique password
- Use Wi-Fi protection access (WPA) encryption rather than wired equivalency privacy (WEP). It is much more secure.
- Turn off your SSID broadcast so other people will not be able to see it
- If you have no other alternative, use WEP. It is better than no encryption at all.
Using these tips will help to ensure that you have a secure wireless network that you can confidently use for both personal and business use.
Wednesday, May 22, 2013Apple fried over taxes U.S. Senators grilled the company's CEO over where it puts -- or doesn't put -- its profits. But who's really to blame when any company uses all available loopholes?
Friday, May 17, 2013Pentagon approves devices running Apple iOS6 The U.S. Defense Department okays government-owned handsets and tablets running the operating system, along with BlackBerry and Samsung's Knox
Wednesday, May 08, 2013Why stick with Microsoft? CRM expert Gene Marks says most enterprises will stick with Microsoft over Google and Apple. Is he right?
Friday, April 26, 2013Coffee with Apple’s Tim Cook now at $500,000 The iPhone’s slumping sales may have cast a shadow on Cook’s leadership, but bids being pulled in by a charity auction featuring some coffee time with him proves the Apple chief is still very popular
Monday, April 08, 2013Mobile trend hurts IE, Firefox Internet Explorer still accounts for largest desktop usage but its weak mobile presence has hurt its overall standing
Thursday, April 04, 2013Analysts weigh in on Apple’s apology to China Three China-based industry analysts give their take on Apple's decision to apologize to Chinese consumers following two weeks of attacks from state-owned media
Monday, April 01, 2013Apple fails to get iPad Mini trademarked The United States Patent and Trademark Office says the word "mini" merely describes the smaller iPad's size
Monday, March 25, 2013Apple snaps up mapping app startup WiFiSLAM WiFiSLAM's indoor mobile navigation technology could help Apple get over its mobile mapping problems
Friday, March 22, 2013Canadians at risk of Apple password breach? Security patch released by Apple is not available in Canada yet
Wednesday, February 20, 2013Five new Java fixes released Oracle promises to accelerate patch cycle amid growing concern over its ability to keep Java safe
Friday, February 08, 2013Apple all alone in eBook price fixing probe MacMillan has become the fifth book publisher to settle with U.S. Department of Justice, leaving Apple Corp. the sole company facing the DOJ’s allegations of eBook price fixing
Monday, January 14, 2013RIM nets 15,000 new BB 10 apps A little more than a week to the formal launch of its BlackBerry 10, Research in Motion reports snagging 15,000 new apps for its much anticipated new phone
Friday, January 11, 2013Mobile devices to get power boost from IPv6 The next version of the Internet Protocol will enable mobile devices to perform better and work longer, according to experts
Tuesday, January 08, 2013RIM, Apple sued over 3G, 4G patents The Canadian smartphone maker and its U.S. nemesis are among 15 companies named in a lawsuit filed before a Delaware court
Monday, January 07, 2013iPad, Android tablets to flood enterprise space Despite its much lauded effort on Surface, Microsoft will be thwarted once more in its bid to capture the tablet market as Android and Apple units are poised to make solid inroads into the enterprise space in 2013
Thursday, December 20, 2012Samsung faces antitrust charges from EC The European Commission says Samsung abused its dominant position in the market by filing patent lawsuits against its rival Apple
Thursday, December 20, 2012Oracle to end Java 6 security support After February 2013, Oracle will no longer post updates of Java SE 6 to its public download sites according to a post on the Oracle Java SE Support Roadmap
Tuesday, December 18, 2012No new trial in Samsung-Apple fight The judge in the US$1 billion trial has refused to order a new hearing in the case. However, both sides can appeal to higher courts
Friday, December 07, 2012Macs to wave stars and stripes Apple CEO Tim Cook says the company will spend US$100 million to bring some Macintosh manufacturing to the U.S. A columnist looks at what it means
Monday, December 03, 2012Why Apple needs an enterprise strategy iPhones and iPads are sprouting up in organizations as bring-your-own-device strategies are embraced. But if Apple wants to be really taken seriously it has to do more
Friday, November 23, 2012BlackBerry 10: Excited yet? RIM's long-term prospects may seem bleak, but a lot of short-term success could put it back in the game
Thursday, November 22, 2012Steve Wozniak talks about the IT culture clash Apple co-founder tells a Toronto audience that rebellious minds in an organization can lead to brilliant ideas
Wednesday, November 14, 2012The ultimate limit of data centre resiliency In Hurricane Sandy’s aftermath, customers may start to pay closer attention to where their cloud provider’s data centres are located, says CentriLogic president and CEO
Monday, November 12, 2012Apple and HTC bury the hatchet The two companies have come to an agreement after many months of litigation
Monday, November 05, 2012Three more dragons to slay before RIM’s return Blackberry 10 needs to be cooler than the competition, says guest blogger Tim Collins