The document discusses the importance of instituting proper Wi-Fi policies as more users demand wireless access both within and outside corporate networks. It recommends implementing basic security measures like encryption and authentication on corporate networks. When mobile workers access external Wi-Fi networks, policies need to accommodate additional risks and equip devices with security software. Experts advise combining perimeter security with endpoint policies, and educating employees on secure wireless use.
1 of 2
More Related Content
Instituting_Wi-Fi_Policies
1. Tech & Trends Click To Print
General Information
September 29, 2006 Vol.28 Issue 39
Page(s) 29 in print issue
Instituting Wi-Fi Policies
Secure Your WLAN & Mobile Workers
As more users clamor for Wi-Fi Internet access, it is a good time to get your house in order in
regards to user and security policies. Wi-Fi access is even changing the face of remote access,
making drafting and instituting Wi-Fi policies a challenge because the policies extend both within
and outside your corporate enterprise, factoring in Wi-Fi use by your mobile workers in their home
offices or when theyre on the road.
The Corporate Network
Your corporate Wi-Fi policies should focus on access control to your critical applications and
internal network infrastructure. Chuck Conley, vice president of marketing for Newbury Networks,
says, Education balanced with solid security policy enforcement are the best remedies for any
small to midsized business thats adopting Wi-Fi to support their business processes. For example,
its always best to implement basic precautions such as changing the standard settings on the
laptops wireless card to not automatically connect to an open network. And implementing
encryption and authentication such as WPA and VPNs are paramount to any wireless network
implementationno matter what size of the company.
Chris Witeck, director of product marketing for Aventail, makers of Aventail SSL VPN and other
remote access tools (www.aventail.com), sees corporate Wi-Fi access as all about policies and
authorization to determine who is the user and where are they. The Aventail vision for remote
access security is to provide a consistent security policy to all devices on the network and treat all
the devices as remote. This model takes remote access policies to the application level vs. the
traditional boundaries of the network perimeter.
Mobile-Ready Wi-Fi Security Policies
As mobile workers take to the road and access the Internet and your corporate network
infrastructure, your policies need to accommodate the additional risks that accessing third-party
Wi-Fi networks pose to your mobile devices and corporate data.
Mitchell Ashley, CTO of StillSecure, makers of StillSecure SafeAccess (www.stillsecure.com),
says, Wi-Fi broadens the scope of exposure because other networks bring new security risks. He
recommends that IT staffs equip mobile devices with sufficient security software, including personal
firewalls, antivirus software, and antispyware software. He emphasizes the threat a compromised
mobile device such as a laptop poses when a user brings it back to the office and logs into the
corporate network.
Conley says, We recommend a combination of perimeter-level security with endpoint security
policies in place. In other words, small to medium-sized businesses can still tighten the perimeter
while providing tighter security on the endpoints (i.e. laptop) to stop physical threats (i.e. USB,
Bluetooth) while employees are working in public hotspots or open Wi-Fi zones.
Wi-Fi Policies For Your SME
http://www.processor.com/editorial/PrntArticle.asp?prnt=1&article=artic...
1 of 2 6/26/2009 3:56 PM
2. Conley says, If you put the right policies in place, get the right tools, and solicit advice and
expertise from people who have a very good understanding of these products and standards, youll
be able to implement a far more secure Wi-Fi environment.
by Will Kelly
Create Your Own Wi-Fi Policies
Here are some points to consider when creating your small to midsized
enterprises Wi-Fi policies:
Keep abreast of WLAN technology and security tool developments.
Treat Wi-Fi access as remote access.
Put consistent security policies in place for all devices on your network.
Put strong network authorization policies in place.
Educate yourself on WLAN vulnerabilities.
Leverage the knowledge of experts to support your Wi-Fi networks securely.
Educate your employees; make sure they understand how to use the wireless
environment effectively without compromising security.
Sponsored Links
D-Link DFL-1100 NetDefend Rackmount VPN Firewall
Provides integrated network address translation, SPI firewall, advanced content
filtering features, IDS protection, bandwidth management, and VPN support
www.Processor.com/NetDefend
Secure Computing SafeWord SecureWire
Provides lightning-fast, ultra-secure access to every application and data resource
in your networkfor all remote and internal connections
www.Processor.com/Secure
Vernier Networks EdgeWall 7000 Series
Ensures network access control for wired, wireless, and remotely connected
users
www.Processor.com/EdgeWall
Copyright 息 2009 Sandhills Publishing Company U.S.A. All rights reserved.
http://www.processor.com/editorial/PrntArticle.asp?prnt=1&article=artic...
2 of 2 6/26/2009 3:56 PM