Basic tips to protect your company’s Wi-Fi networkMaria Cruz Alcocer
How to protect your company’s Wi-Fi network?
More than 30% of the devices that connect to corporate wireless networks do not have any protection method. Are you aware of the risk to which your entire network is subjected?
Nowadays, it is no longer easy to find a place where there is no WiFi coverage, whether public or private.
When a business allows open wireless connectivity to employees, customers, or any outside visitor, the potential attack field expands exponentially as different users and devices have access to the network.
It is very likely that many of the expectations of your employees and customers regarding wireless connectivity in your business are increasing, requiring access to a WiFi network to access real-time information anytime, anywhere. This presents great benefits in efficiency and productivity, but at the same time represents significant challenges, especially in terms of cybersecurity.
The advantages of having a secure WiFi network
- We do not need to connect to a cable that we have previously had to pass through the walls.
- We are connected in any corner of the office. Allows access to network resources from any location within the wireless network coverage area.
- They are inexpensive and are widely used.
- You can easily expand the network where and as needed.
- Wireless Internet access and company resources help your staff be more productive and collaborative.
- Installing connectivity devices is faster and more cost-effective than in a wired network.
Basic advice, How to protect the Wi-Fi network of your company?
Networks have become a basic part of doing business, which is why planning the cybersecurity of your business is just as important as sales and marketing. Here are four factors that a business should consider when setting up a secure WiFi network:
Do not leave access to your WiFi network open.
It is recommended that a network be configured with a Service Set Identifier (SSID), a unique identification that consists of 32 characters and is used to name wireless networks. This allows you to generate multiple wireless networks that have different accesses, for example: a dedicated visitor network that is different from your employees’ network. When multiple wireless networks are used in a certain location, the SSIDs ensure that the data is sent to the correct destination.
Use a RADIUS server
It is recommended to use RADIUS server for authentication and authorization of LDAP user employees, for better user management, keeping a detailed record of access to the WiFi network, privileges, access levels, filters, etc. customized for each employee. Thus avoiding the use of shared keys.
Use a login home page.
In it you can indicate the access conditions and request compliance with them. If you have a constant flow of external visitors who need access to the WiFi network, such as hotels, it is advisable to have a mini portal or web page in which you publish your access policies to the local guest network, through which they must connect first before connecting to the network. It includes an agree button, listing the terms and conditions that must be met before guests can connect to the network. This provides some protection if a guest violates your company policies. It’s also a good idea to apply content filtering policies to prevent someone from visiting inappropriate or malicious sites.
Limit access time to the network.
Provide records that expire in a specific period (hours, days …) taking into account the particularities of your business and your security policies. Network administrators can limit the time of guest network accesses.
Educate your employees on safe uses .
Do not assume that cyberattacks to the network can only come from external users or visitors to your business. Your employees can accidentally create security vulnerabilities, so it is critical to establish security policies and educate your colleagues on safe practices for using wireless networks.
There are more security tips, such as the use of ISE: that among other benefits we highlight the power to centralize and unify a highly secure access control based on the business role to provide a uniform network access policy to end users, through connection wired, wireless or VPN.