02:22 PM

Four Tips For Increasing Wireless Network Security

CMP Information Week
InformationWeek Daily - Wednesday, Aug 23, 2007

Editor's Note

Who Is Responsible For Security, IT Or The Employee?

The answer should be obvious. Both IT and the employee bear their own roles for maintaining security. So why is it that 73% of mobile workers admitted that they aren't always aware of security risks and best practices?

I think the fault is shared. In this study, reported by InformationWeek yesterday, it notes that many employees feel security is IT's job, not theirs. This is a dangerous attitude, both for the employee and the organization for which they work.

Let's take a step back for a second. Remember your first day on the job? Part of your orientation with HR probably included being given an employee handbook of sorts. The handbook spelled out all the behavior expected of you during your tenure with the company. Aside from giving you the bad news that jeans are not considered business casual attire, it also likely included a section regarding IT policies. Many companies expect employees to refrain from using company property (i.e., their PCs) for personal use, such as email and Web surfing. There is probably also language about making sure that sensitive company information is never exposed to outsiders.

Typically you have to sign a document stating you have read the handbook and will adhere to the policies contained therein. But who actually reads the darned thing? If you haven't read the handbook, you may not know that there are security policies that have to be followed with certain corporate data. That doesn't excuse employees from not taking appropriate action, though. Common sense needs to come into play at some point.

Read the rest of Eric's thoughts in the Over The Air blog.

Eric Zeman

Quote of The Day

The superior man, when resting in safety, does not forget that danger may come. When in a state of security he does not forget the possibility of ruin. When all is orderly, he does not forget that disorder may come. Thus his person is not endangered, and his States and all their clans are preserved. -- Confucius

Top Stories

Four Tips For Increasing Wireless Network Security
Among the recommendations: limit the strength of wireless network so it cannot be detected beyond the walls of a home or office.

Related Stories:

Locking The Wireless Network

6 Steps To Protect Your Wireless Network

White Paper

Siemens, Verizon Business Expand Their Unified Communications Offerings

The companies are strengthening their offerings with companies and simultaneously beginning to collaborate and compete with each other.

Internet's Killing The TV Star, Survey Says

The Internet's emergence as a primary home entertainment source is having a major impact on the advertising industry, says poll sponsor IBM.

Gamers Under Fire: Chinese Charge Alleged Fujacks Authors

The majority of malware written in China focuses on stealing gamers' user names and passwords for a growing underground ready to shell out cash to appear to be better players.

Google Puts Ads In YouTube Videos

Google is selling overlay advertising on a limited number of YouTube videos to a select group of partners at a cost of $20 per 1,000 viewers.

Data Warehouse Wars: Teradata Wins One Against HP Neoview

After HP Neoview nabs a humiliating win with Wal-Mart, Teradata beats out HP for the Bank of Shanghai.

IBM Buys WebDialogs To Bolster Its Unified Communications Middleware Client

The acquisition will add Web conferencing as a software-as-a-service offering within the Lotus Sametime UC client.

iRobot Introduces Smarter Roomba

The upgraded vacuum cleaning bots can free themselves from jams, get away from tassels and cord tangles, and slow down automatically when approaching obstacles.

Joybubbles, Phone Hacker Extraordinaire, Dies At 58

Amid a lifetime of collecting teddy bears and other toys, he stumbled onto the telephone network and began using his perfect pitch and whistling ability to place free calls.

Google Earth Adds Star Gazing

Sky in Google Earth lets users turn their desktops into virtual telescopes.

Four Tips For Increasing Wireless Network Security

Among the recommendations: limit the strength of wireless network so it cannot be detected beyond the walls of a home or office.

Federal IT Spending Forecast To Surge In Q4

A government analyst firm suggests vendors may be deluged with orders as agencies use up their remaining funds before the September 30 fiscal year ends.

Music Piracy Costs U.S. Economy $12.5 Billion, Report Reveals

The study is one in a series to examine the economic impact of copyright and patent infringement.

All Our Latest News

On The Go

See InformationWeek's daily breaking news on your mobile device, visit wap.informationweek.com and sign up for daily SMS notifications.

In This Issue

The latest research, polls, and tools

Virtualization At The Desktop?
Examine how more than 250 companies plan to adopt server virtualization technology in this recent InformationWeek Research report, Server Virtualization.

The BI Explosion
Examine the business intelligence strategies of 500 companies, including deployment drivers and challenges, spending plans, and vendor selection, in this recent InformationWeek Research report.

Latest InformationWeek Blog Posts

Calling Out The Storage Market's Innovators
Are you an IT professional who needs to find more efficient, cost-effective ways to handle the storage of your burgeoning corporate data before your infrastructure costs spiral out of control?

Fresh Data On Whom The CIO Reports To?CEO or CFO?
If the CIO reports to the CFO, is that a red flag for IT's role at the company? Does it suggest IT's considered a cost center, not an innovation engine? I've listened to surprisingly passionate discussions about this topic, and we've got some fresh data about how common it is.

CIOs: Use It, Or Lose It
Do you rush to spend up your IT budget before the fiscal year runs out? That's certainly an interesting way to look at the budgeting process.

Microsoft Has Itself To Blame For MTV's 'Urge' Dump
It's hardly surprising that MTV has dumped its 'Urge' music partnership with Microsoft and hooked up with RealNetworks and Verizon. What would you do if you got stabbed in the back?

Who Is Responsible For Security, IT Or The Employee?
The answer should be obvious. Both IT and the employee bear their own roles for maintaining security. So why is it that 73% of mobile workers admitted that they aren't always aware of security risks and best practices?

What Makes A CIO Shudder?
Its mobile workers saying, Security is not my job.

Quick Take: New Headset Targets Notebook-Toting Web Workers
With VoIP becoming more popular (despite occasional blackouts from Skype), there is more of a demand for wearable and efficient headsets. Logitech's Premium Notebook Headset is an efficient and, for the most part, comfortable choice, especially for those constantly on the go and on the phone.

Are Dual Mode Smartphones Really Overhyped?
Some analysts and industry insiders have claimed that dual mode devices are overhyped. I share their skepticism about new technologies and I agree that we need to caution against hype. But, I have to ask a question: Doesn't the iPhone prove that dual mode access is ready for primetime?

Are You Ready To Text Message For A Pizza?
Domino's Pizza has launched a new program in the U.K. called Pizza by TXT. All users have to do is register on their Website, and then they can order a pizza with a simple text message.

Google Still Likely To Bid On Spectrum
Google CEO Eric Schmidt yesterday said his company is still likely to bid in the upcoming 700 MHz spectrum auction. OK, why does Google want to buy spectrum?

White Paper

Path to Profit: Transform your Underwriting Processes
Join Insurance & Technology Editorial Director Kathy Burger, Cindy De Armond, Partner, Insurance Industry Practice, IBM Global Business Services, and Mark B. Gorman, Strategic Research Advisor, Insurance, TowerGroup, to gain insights into how integrating analytics and operations can transform the underwriting process.

CGS Email Management & Archiving Solution Proves Successful for NYC Department of Health
Users at The New York Department of Health maintained large email mailboxes and required direct 24 x 7 access. CGS’ Unlimited Mailbox allowed the archiving of all GroupWise emails, prior to the migration to Exchange. The Unlimited Mailbox solution for Exchange was then implemented to ensure email management during the Exchange platform transition.

How to Succeed with Offshore Software Testing When Almost Everyone Else Fails
Offshore software testing projects fail at a greater rate than most other types of offshore projects. Most of the research into this problem points to very generic reasons. This paper identifies why offshore software testing projects fail, quantifies the impact of a failure and gives a list of actions that can prevent failure from happening.

Job Listings

Featured Jobs:

Eaton Corporation seeking Senior Specialist-IT Infrastructure in Cleveland, OH

Vega Consulting Solutions seeking Project Coordinator in Parsippany, NJ

San Joaquin Delta College seeking Director of System Development in Stockton, CA

Fereal Reserve Bank of St. Louis seeking Voice/Data Communications Specialist in St. Louis, MO

DisplaySearch seeking IT Project Manager in Austin, TX

For more great jobs, career-related news, features and services, please visit our "Career Center.

Get More Out Of InformationWeek

Try InformationWeek's RSS Feed

Discover all InformationWeek's sites and newsletters

Recommend This Newsletter To A Friend
Do you have friends or colleagues who might enjoy this newsletter? Please forward it to them and point out the subscription page.

Manage Your Newsletter Subscription

More than 20,000 IT terms, more than 20,000 definitions:
All at your fingertips, all in TechEncyclopedia

Saw a TechWeb feature you want to see again?

You are subscribed as #emailaddr#. To unsubscribe from, subscribe to, or change your E-mail address for this newsletter, please visit the InformationWeek Subscription Center.

Update your subscriber profile.

Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: InfoWeek@update.informationweek.com

If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks. We take your privacy very seriously. Please review our Privacy Policy.

InformationWeek Daily Newsletter
A free service of InformationWeek and the TechWeb Network.
Copyright (c) 2007 CMP Media LLC
600 Community Drive
Manhasset, N.Y. 11030

© 2007  |  CMP Technology LLC  |  Privacy Statement  |  Terms Of Service

Comment  | 
Print  | 
More Insights
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 Digital Issue, April 2015
The 27th annual ranking of the leading US users of business technology
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of April 19, 2015.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.