Search

Tuesday, December 16, 2008

Improve Your Businesses Wireless Security

A business wireless network should be a network that is safe from hackers and unauthorised users. Here are some steps to secure your network from such intrusions;

Create a Wireless Security Policy

Create a policy that specifies who can use the network, and how to protect the network
This is one below is taken from a Cisco template I found on a website;
- Acceptable use policy, to specify what types of network activities are allowed and which ones are prohibited.
- E-mail and communications activities, to help minimise problems from e-mails and attachments.

- Antivirus policy, to help protect the network against threats like viruses, worms, and Trojan horses.
- Identity policy, to help safeguard the network from unauthorised users.
- Password policy, to help employees select strong passwords and protect them.
- Encryption policy, to provide guidance on using encryption technology to protect network data.
- Remote access policy, to help employees safely access the network when working outside the office.

Educate your Employees
Educate your employees and get them involved in protecting the network. Use informational posters and training about security, passwords, and privacy to help you keep your business information and communications secure.

Secure the WLAN
- Use strong encryption: When you install your network, set up the strongest wireless encryption you can. WEP encryption is adequate, but WPA and WPA2 are better options.

- Secure communications: Encrypt data that travels on the network, and authenticate users to be sure you know who is using the WLAN.

- Change the default network name to something that is hard to identify so it is unrecognisable.

- Use MAC address control lists combined with encryption to restrict user access.
- Be sure that management ports are secured with non default names and passwords.

- Hide the access points to prevent tampering.

- Use video surveillance cameras to monitor your office building and site for suspicious activity.

Protect Your Company from Outside Threats
Protect wireless devices with the same security you use for the your company network. (i.e. firewalls, VPNs, and antivirus software)


Protect Your Wired Network from Wireless Threats

Install wireless intelligent protection switching (IPS) devices to prevent unauthorised, "rogue" access points and other wireless threats.