Wireless Risks: How To Avoid Common Pitfalls - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Feature
News
7/15/2005
10:35 AM
50%
50%

Wireless Risks: How To Avoid Common Pitfalls

Building a wireless LAN infrastructure isn't cheap or without risk, but there are steps businesses can take to protect their investments and avoid potential problems.

1Make conservative investments. Although wireless equipment costs continue to decline, the technologies are still new and evolving. That means product life cycles tend to be short. Steve Novak, CIO at Kirkland & Ellis LLP, has set a policy for the global law firm to make incremental investments in emerging technology every few years instead of undertaking a big technology refresh every five to seven years, which has been the traditional approach to building corporate networks. The firm also looks for wireless products that can be centrally managed and easily upgraded with software.

2Know what you're buying. Despite tight IT budgets, businesses have a wasteful habit of buying more wireless LAN equipment than they need because they haven't fully researched what's included with the products they're buying, says Craig Mathias, an analyst at wireless consulting firm Farpoint Group. A common mistake is purchasing an intrusion-prevention system without realizing one is included as part of a wireless LAN product, Mathias says.

3Security is a top priority. Equipment should be compliant with the 802.11i standard for authenticating and encrypting wireless LANs. Enforce security policies, such as requiring hard-to-crack passwords and limiting the number of unsuccessful logins. Each laptop should have firewall software that's integrated with the primary corporate firewall. Mobile workers should use a VPN. To ease administration, consider buying security software that supports multiple functions. IPass Inc. offers client software that includes device authentication, patch management, and policy enforcement in a single interface.

Illustration by Campbell Laird

Return to the story:
Work Without Wires

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
News
IBM Puts Red Hat OpenShift to Work on Sports Data at US Open
Joao-Pierre S. Ruth, Senior Writer,  8/30/2019
Slideshows
IT Careers: 10 Places to Look for Great Developers
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/4/2019
Commentary
Cloud 2.0: A New Era for Public Cloud
Crystal Bedell, Technology Writer,  9/1/2019
Register for InformationWeek Newsletters
Video
Current Issue
Data Science and AI in the Fast Lane
This IT Trend Report will help you gain insight into how quickly and dramatically data science is influencing how enterprises are managed and where they will derive business success. Read the report today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll