There's no disputing that the convenience of a wireless LAN frees your employees, increases mobility, and eliminates the clutter of wires in your small business office. But these wireless networks have inherent security risks that can leave your sensitive data and trade secrets open to hack attack from both inside and outside the network.
It is easy to understand why a wireless LAN is so attractive. It gives users the ability to move freely with laptops or other connected devices around the office or work area, and surrounding areas like an outdoor picnic table or nearby park, all while maintaining access to the server and Internet connection. Depending on the size of your office and number of employees, setting up a wireless LAN can cost as little as $1,000. This freedom and the reasonable price have made wireless LANs an increasingly popular choice among top companies across the globe.
Airborne dangers
But the wireless LAN's main form of communication — radio waves — can be easy for hackers or other malicious intruders to intercept. It is difficult to control how far radio waves travel, possibly giving hackers with finely tuned equipment access to your network a mile or more away. Electronic information can be tampered with, stolen or copied. Some small businesses have discovered that hackers gain access to their systems by parking outside the company building and using dishes to pick up network signals.
Small businesses are finding that in order to enjoy the ease of wireless networking, it is necessary to employ a sturdy security regimen to store and transmit sensitive data and customer information safely on their servers. A wireless LAN can be protected in much the same way as a regular LAN. There are several levels of security, and they work best when used together.
- VPN. A VPN, or virtual private network, can boost security at your small business by allowing mobile workers and wireless nodes to tunnel into the network. VPNs enhance security by making it more complicated and difficult to gain unauthorized access to the route to the LAN. VPN users can also take advantage of encryption and authentication to make data unreadable and verify its origin. Like other security measures, VPNs should be combined with other tools such as a firewall.
- Encryption. If you use a wireless LAN, you should also be using encryption –– without question. Using longer encryption keys is a popular way to improve on that security; a longer key is more difficult to crack. You should take advantage of the strongest available encryption, which is currently 128–bit. And a key that is automatically generated on a per–session basis is best because the key is constantly changing. This type of encryption is problematic for hackers, who require more time to crack keys.
- Firewall. Firewalls are an integral line of defense for any small business network, wireless or not. Firewalls monitor all traffic flowing into and out of the network, blocking suspect material. This traffic control application blocks hackers from gaining access to your system. Firewalls, such as Norton Personal Firewall, also heighten security by allowing you to designate which applications can access the Internet, preventing the accidental transmission of sensitive data.
- Intrusion detection. This software alerts you to intrusions, informing you of possible holes in your network so you can improve your security measures or even your security policy. Because the intrusion detection alerts you to dangers and does not protect you from them, it should always be coupled with a form of protection, such as a firewall. Norton Personal Firewall offers you both firewall protection and intrusion detection in one package.
- Real–world security. An obvious vulnerability when using a wireless network is the danger of stolen laptops or other connected devices. If a laptop is stolen, it is relatively easy for a hacker to gain access to your network if the computer is already connected to it. In this case, it is important to be proactive and institute a security policy within your small business that raises awareness of the danger of theft and encourages employees to keep their laptops and connected devices secured when not on their person. While not a strong line of defense, a strict password policy may provide some security in the case that a wireless device is stolen.
As wireless LANs continue to grow in popularity, the security concerns grow. You can take advantage of the freedom and ease of these wireless networks as long as you properly protect your computers and the sensitive data on them.
Symantec™ ©2002.