Basic tips to protect your company’s Wi-Fi networkMaria Cruz Alcocer
How to protect the wifi network of your company?
More than 30% of the devices that connect to corporate wireless networks do not have any method of protection. Are you aware of the risk to which your entire network is subject?
At present, it is no longer easy to find a place where there is no WiFi coverage, either public or private.
When a company allows open wireless connectivity to employees, customers or any external visitor, the potential attack field expands exponentially because different users and devices have access to the network.
It is very likely that many of the expectations of your employees and customers regarding wireless connectivity in your business are increasing, demanding access to a Wi-Fi network to access information in real time anytime and anywhere. This has great benefits in efficiency and productivity, but at the same time it represents important challenges, especially in terms of cybersecurity.
The advantages of having a secure WiFi network
- We do not need to connect to a cable that we previously had to pass through the walls.
- We are connected in any corner of the office. It allows access to network resources from any location within the coverage area of the wireless network.
- They are economical and their use is widespread.
- You can easily expand the network where and as needed.
- Wireless Internet access and company resources help your staff to be more productive and collaborative.
- The installation of connectivity devices is faster and more cost effective than in a wired network.
Basic tips, How to protect the Wi-Fi network of your company?
Networks have become a basic part of doing business, so the planning of your business’s cybersecurity is as important as sales and marketing. Next, I share four factors that a company should consider when configuring a WiFi network in a secure way:
Do not leave access to your WiFi network open.
It is recommended that a network be configured with a service set identifier (SSID), a unique identification consisting of 32 characters and used to name wireless networks. This allows you to generate multiple wireless networks that have different accesses, for example: a dedicated network for visitors that is different from your employees’ network. When multiple wireless networks are used in a certain location, the SSIDs ensure that the data is sent to the correct destination.
Use a RADIUS server
It is recommended to use RADIUS server for the authentication and authorization of LDAP users, for a better management of the users, to keep a detailed record of access to the Wi-Fi network, privileges, access levels, filters, etc. customized for each employee. Avoiding the use of shared keys.
Use an initial connection page.
In it you can indicate the conditions of access and request compliance to them. If you have a constant flow of external visitors that need access to the Wi-Fi network, such as hotels, it is advisable to have a mini portal or website where you post your access policies to the local guest network, through which they must connect first before connecting to the network. It includes a button of agreement, listing the terms and conditions that must be met before the guests can connect to the network. This provides some protection if a guest violates your company’s policies. It is also a good idea to apply content filtering policies to prevent someone from visiting inappropriate or malicious sites.
Limit the time of access to the network.
Provide records that expire in a specific period (hours, days …) taking into account the particularities of your business and your security policies. Network administrators can limit the time of access to the guest network.
Educate your employees in safe uses.
Do not assume that cyber attacks to the network can only come from external users or visitors to your business. Your employees can create security vulnerabilities accidentally, so it is critical to establish security policies and educate your colleagues about safe practices for the use of wireless networks.
There are more security tips, such as the use of ISE: that among other benefits we emphasize the ability to centralize and unify a highly secure access control based on the business role to provide a uniform policy of access to the network to end users, through connection wired, wireless or VPN.