PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
January 2002

Control wireless vulnerabilities before they control you

It's a sight that would make any sales manager proud: your company's top sales rep is dutifully e-mailing detailed reports on the day's activities over a public wireless 802.11b network as he waits for his lunch across the street from the office. But would your sales manager be quite so happy if she knew the sensitive data transmissions sent from the rep's laptop could be grabbed by anyone else within a few hundred yards? Or, let's say your hospital has deployed the latest health care technology: a state-of-the-art wireless handheld application that lets administrators, physicians and medical staff access records, order lab tests and prescribe medications. It's a hit. Recordkeeping costs are lowered, patients agree service is more efficient, and fewer errors are made. But what happens when a doctor sets down his PDA -- still logged on -- and discovers it's missing when he reaches for it again? WLANs Take Hold Organizations are deploying wireless LANs (WLAN) in large numbers, but typical of emerging technology, implementation is ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

Columns in this issue