Skip to content
  • August 29, 2006

  • Local Wireless Networks - Security Risk?

    (Originally Printed in The Beacon News)

    August 29, 2006


    By Labor Day, Aurora could be one of the first communities to offer free wireless Internet access and Naperville may be soon to follow. This technology is convenient allowing access without a need for cumbersome wires or phone lines. If you are simply near a hotspot, a wireless antenna, you can easily connect using a standard wireless adapter.

    As wireless or WiFi becomes more popular, businesses are looking to implement this technology on their own internal networks. Though company's like MetroFi, the provider of wireless Internet in Aurora, are taking precautions to prevent security risks on their network many other companies are leaving themselves vulnerable. So, is this technology too risky for your business? Wireless technology is essentially a radio signal broadcasting Internet traffic.

    Since this signal is transmitted openly through the air, it is possible for other wireless users to intercept this signal. Home improvement giant, Lowe's, discovered the perils of unsecured wireless transmissions the hard way. Lowe's used an in-store wireless network to transmit credit transactions from registers to a central processing point. Three local students were able to access the network and steal valuable customer credit data from a nearby parking lot.

    Though there are dangers to using this technology, the use of wireless networks can be very convenient for business travelers; allowing them access to email, the web, and their internal business network. However, special caution should be taken to protect corporate information.

    One method of protection is a VPN, Virtual Private Network, which requires all users to authenticate onto your network with an appropriate user name and password. This will verify that your local network can only be accessed by users authorized by your organization. The VPN acts as a private pathway that encrypts all of the data that is sent, making interception nearly impossible. Another method of encryption is wireless encryption technology, WEP or WPA, which is easily configured on most wireless equipment and offers additional protection above a VPN. Mixing these two technologies, you can create a secure environment with all the conveniences of wireless. Remember, as part of any good security model; keep all operating systems, firewalls, anti-spyware and virus software up-to-date. Do not share files and be sure to turn off your laptop when it is not in use. These steps will increase your data security and limit the network access to other users. While wireless networks are convenient, it is important not to compromise your business network. Talk to your IT consultant for further security information.


    Jody Jankovsky is managing partner and owner of Black Line Consulting. He can be reached through his website at www.blacklineconsulting.com or by calling (630) 388-1700.

    Read the Full Article Here

    Reach out to us

    We look forward to answering your questions. We are always available to provide any support you need.
    Let’s talk.