Designing a Secure Network
"Many Wireless Networks Lack Security," "Under the Radar: Mobile Devices as a Threat to Enterprise," "Wardriver Pleads Guilty in Lowes WiFi Hacks," and "Consultant Finds Security Flaw In Linksys Wireless Router."
On top of these screaming headlines, our experience confirms that less than half of scanned sites have implemented security solutions for their wireless networks. That is a troubling statement, especially given that wireless networking and mobile computing are two of the fastest growing technologies since the Internet. Although wireless networks have ushered in sweeping productivity gains at some enterprises, they have also increased their exposure to security risks in ways that these enterprises do not necessarily understand. In contrast, many organizations are shying away from wireless networking because they perceive wireless security to be as effective as a screen door in a submarine.
But organizations are rapidly deploying wireless devices to increase productivity and improve connectivity. Although wireless computing devices and infrastructure support systems can provide an increase in connectivity, they change the threat mix and also provide increased security risks, resulting in potential vulnerabilities. While we continue to assimilate these technologies into the workplace, we need to ensure that we take a balanced approach regarding the associated vulnerabilities and security risks. You must implement an integrated protection scheme when you deploy wireless technology to support your business and mission-critical operations.