While the news that companies are using wireless technology is encouraging, it also has security problems. As the amount of wireless area networks increases, the chances of hackers hacking into corporate networks are also increasing. The good news, however, is that when the wireless network industry grows, businesses are more concerned about cybersecurity issues than usual, at least in terms of basic security.
" Wired Equivalent encryption "(WEP) ability to defend their wireless networks has grown dramatically. RSA security Tim , regional vice president of international marketing. Picard (Tim Pickard) " protect its wireless network security from 2005 65% rose to 74%; 62% rose to 75%; from 2005 9%
But there's still a lot of room for improvement. In the three cities, nearly one-fourth of the companies have not taken any steps to protect their networks from malicious attacks. In addition to being able to steal confidential information, these companies are infected with the virus and Trojan horse program (Trojans)
Paris, London and New York near 1/4 " " two-factor authentication solution " and Dynamicode " RSA Security Two-factor authentication technology integrated into a authentication token " every 60 seconds can produce a new and unique password. The user simply needs to type in the individual user ID number (id or PIN)
The benefit of this " two-factor authentication solution " is that no matter how clever a hacker is, it is not possible to guess such a complex dynamic password in a short period of time. In addition,Dynamicode provides a one-stop solution that includes hardware, software, and implementation services, eliminating the overhead of building infrastructure, eliminating the need for additional human resources, hardware, or software, and reducing deployment time, deployment, and management costs. For the operator, it's pretty easy to use.
In addition to corporate wireless regional networks, public wireless Internet access points continue to rise ; It is worth noting that there are " public wireless internet sites" that are " disguised " to steal the user's information : A short-lived wireless network Bridge, The design looks like a real bridge to steal the user's confidential information.
Capgemini Management Consulting, Inc., providing security advisory services (Capgemini UK) of Phil . Cracknell (Phil Cracknell) said : " in wireless network security vulnerabilities," disguised " public wireless Internet access Point has formed the most serious and most likely interface, so that the attackers in almost a short period of time to intercept a batch of valuable information. "
Although wireless networks can lead to higher production value, enterprises must know how to take appropriate precautions to ensure the security of the network, in order to prevent outsiders invasion and destruction. It is best to use a high-level network security solution, or, at a minimum, to start the " Wired Equivalent Encryption " feature in wireless settings, which is at least a basic method compared to no security precautions.
Basic security aspects of network security