Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 18 December 2012

Top 5 Wireless Tips for IT Pros

Posted on 05:30 by Unknown
via Altius IT Information Security...

Listed below are the top 5 tips IT professionals should take to enhance wireless network security.

1. Encryption. There are many different types of encryption methods used to secure wireless networks. Wired Equivalent Privacy (WEP) is the oldest and least preferred. Wi-Fi Protected Access (WPA) is newer and offers better protection. WPA2 is the newest and should be used if possible. Configure Virtual Private Network (VPN) access for users connecting to corporate systems.

2. Firewalls. Segment the wireless network from your in-house wired network. Use firewalls to restrict traffic to and from the internal network. Configure user devices so firewalls are turned on and actively protect applications and data.

3. Manual connection. Configure portable devices such as laptops and handhelds so that they do not automatically connect to wireless networks. A manual process helps ensure that the device connects to the appropriate wireless network.

4. Patch management.
Ensure device operating system, application, and security protection software is patched and up-to-date. Ensure browsers and updates to third party software packages are applied in a timely manner. Critical updates should be tested and applied as soon as possible.

5. Incident management. Prepare a formal Incident Response Plan and educate users to inform the appropriate personnel if they believe they logged into the wrong network, sensitive information such as their ID/password was compromised, their device was lost or stolen, etc. (more)
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in advice, Wi-Fi | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • Bugging Boss for a Raise Lands Three Employees in Jail
    China - Three public officials were each sentenced to 20 months in jail for illegally wiretapping a county Communist Party chief of central ...
  • Holiday Shopping Safety Infographic
    Click to enlarge . Click to enlarge .
  • New York Times - Quote of the Day - Tapped Out On Taps
    "I'm so jaded at this point that I'm not surprised. And from my perspective, let them all wear wires. Let's catch everybody...
  • From BULLRUN to NOCON and LACONIC
    On September 5, The Guardian , The New York Times and ProPublica jointly revealed that NSA has a top secret program to break encryption sy...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ►  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ▼  2012 (84)
    • ▼  December (33)
      • 2013 at the International Spy Museum
      • Predicting Personal Aerial Surveillance – Drone On
      • Are They Tracking You? - Government Cell Phone Sur...
      • Turkish PM: Five Electronic Surveillance Devices F...
      • See Two App Store Icons on Your Phone? Beware.
      • Putting Spyware on Daughter's Phone Nets Restraini...
      • Remember the spy who was found dead in a duffle ba...
      • Wiretapping Sweeps Over China
      • Repeat after me, class, "Emails are postcards."
      • Christmas, and another phone company Pontius Pilat...
      • KGB: We Bugged Royals (We're shocked.)
      • Three Years of Privacy Stories - Wall Street Journal
      • Android Virus Uses Your Phone to Spread Spam
      • SpyCam Story #664 - This Month In SpyCam News
      • Florida Man Convicted in Wiretapping Scheme Target...
      • Android Malware Among Top Threats for 2013
      • FutureWatch: New TSCM Tool on the Far Horizon
      • The Bugging Report Too Dangerous to be Released
      • " I heard that law enforcement has some sort of sc...
      • Dockworkers Union Alleges Eavesdropping - West Coa...
      • Top 5 Wireless Tips for IT Pros
      • UPDATE: From our "Persistence is Futile" file...
      • Google Funds Spy Technology - Surveillance to the ...
      • UPDATE: $50 Hacking Device Opens Millions of Hotel...
      • NCTC Scope "Breathtaking" - "Pre-Cogs" - fiction t...
      • 2012 - Targeting U.S. Technologies Report Out
      • Security Flaw – Samsung Handsets & Tablets
      • TSCM Bug Sweeps: When, and When Not To - Part II
      • Feeb to Fed Xmas Files Secret Flash Sale
      • How to secure your Android phone - 14 Tips
      • Bus-ted... Public Buses Quietly Adding Microphones...
      • "Get me Bond. I'm ticked at the watchmakers."
      • Pictures at the NSA's 60th anniversary
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile