PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
January 2002

Enterprise wireless security threats and responses

Wireless security threats can be the bane of an enterprise's existence -- unless they are prepared for potential problems and know which solutions to put in place should they occur. Refer to the following list of threats and responses below to mitigate wireless issues in your organization. Insecure devices Hardware and software vulnerabilities Palm OS v4.0 promises a variety of security improvements in OS vulnerabilities, such as better concealment of passwords; elimination of lockout bypass with debug mode PocketPC 2002 adds security features such as "strong" passwords Augment native security capabilities with third-party products Easily lost or stolen Establish policies and procedures to respond to theft or loss Physical locking system (PDA Saver) Viruses and cross-system attacks/exploits Implement virus protection on both host PCs and handheld devices Prohibit installation of personal software or hardware extensions Data in transit: 802.11b WEP encryption vulnerabilities Implement server-based synchronization for better ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

-ADS BY GOOGLE

Close