How secure is your office network - CCR Technology Partners
348
post-template-default,single,single-post,postid-348,single-format-standard,ajax_fade,page_not_loaded,,qode_grid_1300,footer_responsive_adv,qode-child-theme-ver-1.0.0,qode-theme-ver-10.1.1,wpb-js-composer js-comp-ver-5.0.1,vc_responsive

How secure is your office network

How secure is your office network

How secure is your office network

Wireless security is something that should be taken very seriously. The first goal for any hacker attempting to gain access to someone’s network is physical access – in traditional cable networks this would need to be established either by physically breaking in to the office or by trying to find a weak point and gain access via the Internet. When wireless networks became mainstream they made things much easier for hackers due to the fact that one could become part of the local network without ever entering the building simply by connecting to or listening in on the wireless network.

For this reason wireless security is very important and whilst you may think that any type of wireless security that has a long password is secure that is not always the cases.

Hackers often have access to advanced tools that will take advantage of certain weak points within some wireless security protocols making them very easy to break.

Types of wireless security

The most common types of wireless security are WEP, WPA and WPA2 although there are also many variations in between and other enterprise options as well.

WEP is the least secure of these technologies and whilst it is normally protected by the minimum of a 10 digit passcode it has certain weaknesses that are susceptible to attack.

WPA2 is a much more secure technology and is the preferential security type for protecting most wireless connections.

Other security methods

In addition to the type of wireless security that you chose there are also other changes that can be made to increase security. Choosing a strong password is very important and should be a mixture of numbers and letters and also a non-dictionary work (ie a random combination of letters and numbers).

Lastly the SSID or the name of the wireless network can also be hidden – this can be done on most common routers and wireless access points and means that if a hacker “scans” the wireless airwaves, the network will not appear. Whilst this will not stop all hackers, it will fool many of them and means the network is less likely to be a target of an attack in the first place.


Would you like a professional analysis of your current network? Contact us today to discuss how you can improve your network security.

 

No Comments

Sorry, the comment form is closed at this time.