Wireless network security News
September 19, 2001
Attaching your enterprise architecture to a wireless network can create serious security concerns. Learn how to avoid these wireless security risks.
Wireless network security Get Started
Bring yourself up to speed with our introductory content
This mini learning guide helps enterprise information security managers and executives develop a better understanding of wireless network security and learn why investing time and resources in securing your wireless network can help thwart security threats, such as war driving and password cracking. Continue Reading
Don't let Wi-Fi become the weak link in your network's armor! Learn the business risks posed by wireless, essential countermeasures that can reduce those risks, and industry best practices for designing, deploying and monitoring secure WLANs. Continue Reading
Perhaps the biggest network security concern for many enterprises is securing a wireless local area network (WLAN). This three-part expert lesson provides best practices for securing a WLAN in the enterprise. Lesson 1 focuses on methods of systematically monitoring your WLAN for intruders and ways to proactively reduce network discovery. Lessons 2 and 3 focus on how to protect users and the network, respectively. Continue Reading
Evaluate Wireless network security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
WEP and war drivers scaring you away? Try these new solutions and best practices to protect your wireless networks. Continue Reading
Manage Wireless network security
Learn to apply best practices and optimize your operations.
Expert Mike Chapple examines wireless vs. wired security and offers his enterprise wireless network security best practices. Continue Reading
The TJX data breach revealed all too well the weaknesses of the Wired Equivalent Privacy security model. The retailer's well-documented compromise of more than 94 million credit card numbers proved that intruders can easily take advantage of unprotected networks. In this tip, Mike Chapple reviews some best practices that will minimize an organization's exposure. Continue Reading
With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide. Continue Reading
Problem Solve Wireless network security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Group Policy can be used to control wireless access in Windows networks. Find out which Group Policy settings you should create to accomplish this in this tip. Continue Reading
Inadequate wireless security can jeopardize critical company information. Encryption is an important part of wireless security -- but how does it work? In this tip, first in a two-part series on 802.11 wireless security protocols, learn how WEP or Wired Equivalent Privacy works and why it alone is not an adequate wireless security solution. Continue Reading
This section of our hacker techniques and tactics series focuses on implementing wireless security basics to prevent hacker compromise. Continue Reading