Story image

When it comes to wireless networks, security can't be an afterthought

17 May 16

The Internet of Things, bring-your-own-device (BYOD) office environments, and cloud-based applications are contributing to rapid changes in how organisations deploy and use wireless networks. With these changes come new security challenges for wireless networks and different approaches to deal with them, according to Ilan Rubin, managing director of Wavelink

Rubin says, “Security should be one of the biggest factors when planning an enterprise wireless network deployment. Wireless networks can be used by hackers to gain unauthorised access to networks and access sensitive information. 

“Most people are aware that public wireless networks can pose a risk to those using them, but unsecure enterprise wireless networks can also expose companies to risks. All it takes is one person to get past a network’s defences for a serious breach to occur.” 

According to Rubin, to protect themselves, their employees, and their customers, organisations should plan their wireless networks with the security implications in mind. This means building networks designed to maximise the effectiveness of security platforms, with architecture that aids in the monitoring of network traffic and swift action in the event of an attempted attack. 

Regarding security infrastructure, organisations should look for solutions that combine comprehensive security with enterprise access, enable segmentation of devices, and access layers across both wired and wireless networks, he says. Security technology protecting wireless networks should also embody a flexible platform with end-to-end protection, and be easily scalable to enterprises of all sizes. 

Rubin says, “It is far more effective and advantageous for organisations to design their wireless networks around cyber security capabilities, rather than viewing security as an afterthought. This way, enterprise access in a secure architecture framework is guaranteed from the outset. 

“If possible, wireless network architecture planning should incorporate the hardware as much as it does the software elements. For example, some wireless network infrastructure offerings come with integrated access points, application appliances, and controller-based management facilities. This sort of solution can be deployed and scaled for organisations of all sizes.” 

ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Ransomware infection? Here’s how you control the damage
Ransomware has evolved to be more sophisticated and targeted, and remains a threat to businesses of all sizes.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
'DerpTrolling’ faces jail time for Sony DoS attacks
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
It's time to rethink your back-up and recovery strategy
"It is becoming apparent that legacy approaches to backup and recovery may no longer be sufficient for most organisations."
Dropbox strengthens security with raft of new partnerships
Integrations will keep customer content protected and secure with tools for controlling identity access, governing data, and managing devices.
Companies swamped by critical vulnerabilities – Tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
Don’t let your network outgrow your IT team
"IT professionals spend less than half of their time at work optimising their networks and beefing it up against future security threats."