The implications of going wireless

August 2003 Infrastructure, Security Services & Risk Management

Wireless local area networks (WLANs) bring true mobility to the business arena. It allows users to move from area to area while maintaining connectivity and offers a variety of business benefits driven by this user convenience. Other significant drivers of the technology include increased ability to transact business and immediacy of information.

Organisations who have so far embraced wireless technology and applied it to their business, have seen tangible results such as increased sales, improved customer service, a strong competitive advantage and, important for the financials, rapid return on investment.

For all these reasons, predicted growth in the WLAN market is from $2,4 to $5,2 billion by 2005.

However, according to Chris Davis, executive at NamITrust, the enterprise security division within NamITech, WLANs have distinct security implications for organisations. "It is exceptionally difficult to control physical access to a WLAN," says Davis. "They can be purchased and deployed with minimal cost and effort, possibly by individual departments who have not consulted with the IT department. Of course, this runs the risk of creating vulnerabilities on the overall security perimeter."

Vunerability

In addition, security weaknesses inherent in the WLAN protocols make a corporate network susceptible to any number of possible attacks. Should an organisation experience a malicious attack on its WLAN, it faces a compromise of information integrity and loss of customer faith.

Because of the above factors, it is critical that attention is paid to the security around WLANs. "Organisations need to seriously consider the vulnerabilities and additional security features required to make the basic WLAN specifications more secure and usable for the organisation," continues Davis.

A complication particular to WLANs is that an intruder could execute an attack without leaving a trace of evidence, as is generally found in traditional attacks. When an intruder closes their unauthorised session on the WLAN, no audit trail such as a traceable IP address is left behind. Without these vital audit trails, a WLAN operator may be held liable for illegal activities carried out on their networks.

Security measures

But rest assured, there are several security measures that can be instituted to limit the threat facing a WLAN. On a very practical level, the organisation should make sure that only authorised users are allowed to access the WLAN, using approved mobile devices. The company can implement stringent access controls, regulating which areas of a network people can access when connected through a wireless device as opposed to a wired desktop. And of course, strong authentication measures are vital. The organisation must have clearly defined policies regarding its WLAN, and the users of that WLAN should be documented and managed carefully.

"An important point to remember when considering the establishment of a WLAN, is that although the challenges are slightly different, wireless security cannot be viewed in isolation. It needs to be considered within the context of the overall security of the organisation," explains Davis. "In fact, while it certainly does require attention, it really remains just a symptom of the greater problem - overall security. As illogical as it may seem, only by treating your WLAN as insecure, will you be able to ensure the integrity of your organisation's wired network."

For more information contact NamITech, 011 458 0081.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cyber resilience – protect, defend, recover
Infrastructure
The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.

Read more...
Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Top bets for backup and business continuity
Infrastructure
Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...