The weakest link in network security is the wireless network used by Home Office users. IT administrators must analyze unprotected networks they use and take measures to mitigate the risks. For example, administrators can implement an effective remote access policy to help users protect their networks from attacks.
In the article "self-white of a wireless network thief" published on Time.com, Levi's Rosman introduced how to use others' wireless networks for free. The first thing I did when I moved into my new apartment three years ago was to sit in a box and open my laptop to find wireless access points. As a result, I found that the apartment is surrounded by various wireless networks that can be used at will ....... In the next three years, I have not paid any fees for network access. All the data is from insecure wireless networks of neighbors.
Discussing whether to support or oppose the theft of wireless networks from the ethical and ethical fields is another issue. grousman's article reminds us that, the weak links in the networks around us often exist in the end users of the Home Office.
For end users, using virtual private networks and powerful access control and identity authentication tools is a necessary means to ensure the security of their wireless networks. IT departments often emphasize their importance. In addition, we should not only provide more help to home users in information, but also include devices. However, I do not recommend that you manually configure the home network devices of each user, which is often impossible to complete. Instead, I suggest conducting a promotional activity to help users understand the importance of network security and common methods for configuring the home network.
Create, assign, and execute a valid Remote Access Policy
An effective remote access policy should be established first, and each remote user should receive and sign the policy manually or electronically ). TechRepublic is a good place to provide a lot of relevant information when the company starts creating policies.
Provide information about General Wireless Network Security
Whether or not they are part of your remote access policy, publish them on the IT department's Intranet or by email, the following tips about wireless network security are good options for users to learn about Wireless Network Security:
Use wireless network protection access mode WPA) or wireless network protection access mode WPA2) instead of dynamic Wired Equivalent security mode WEP) for wireless network encryption.
The SSID of the broadcast service set identifier is prohibited.
Use the firewall.
Use a strong and easy-to-remember password.
Periodically monitors network access.
Related Articles]
- Proficient in home wireless network settings