Intelligent CIO Africa Issue 45 | Page 28

THANKS TO THE EVOLUTION OF TECHNOLOGY , SETTING UP AN OFFICE WIRELESS NETWORK HAS BECOME VIRTUALLY A PLUG-AND-PLAY EXERCISE .
EDITOR ’ S QUESTION

BETHWEL OPIL , ENTERPRISE SALES MANAGER ,

KASPERSKY IN AFRICA

Q + A + Q + A + Q + A + Q + A + Q + A + Q + A + Q + A +

Despite Wi-Fi technology being around for a long time , CIOs and IT teams still make mistakes when deploying Wi-Fi in their enterprise environments . One of the biggest mistakes is not changing the default settings and password of any new devices connecting to the network .

The out-of-the-box admin password , combined with any potential hardware ( or software ) vulnerabilities , can give malicious users full control over the device . From there , it is then a relatively easy jump to access the network and sensitive data .
As part of the setup , IT teams must be cognisant of disabling things such as remote management and broadcast SSID on the routers or access points . The former ensures the device is not accessible from a web page while the latter introduces an added security layer that mitigates against the risk of the network being hacked . Thanks to the evolution of technology , setting up an office wireless network has become virtually a plug-and-play exercise .
IT teams simply need to connect the router or access point to the network and be guaranteed of wireless coverage . Of course , there is great risk in the simplicity of the process as it lulls people into a false sense of security .
Looking beyond the basics , the built-in security capabilities of routers or access points must be considered . Most Wi-Fi devices feature several cybersecurity valueadds . These can include support for port and packet filtering , QoS control options and integrated firewall features . It is up to the technical team to assess the security features of the Wi-Fi devices and selecting the ones that best integrate into the existing network environment of the organisation .
Industry pundits say securing Wi-Fi networks cannot be understated and enterprises should ensure comprehensive security for their networks .
In addition to keeping wireless routers and access points secure , companies must embrace a total approach to the cybersecurity of their environments .
Yes , being sensible about router settings , strong passwords and encryption , and firmware updates will deliver great results in safeguarding the corporate environment . But that alone is not enough .
Instead , IT teams need to analyse their firewalls , anti-virus software and other endpoint security solutions to ensure a more integrated way of protecting the corporate environment .
That said , there remains a balance between being completely secure ( as much as a company can be ) while still delivering a practically efficient experience for employees . There is also no ‘ perfect ’ configuration that can be applied to every company . Each business has its unique requirements when it comes to wireless connectivity inside the office building . Regardless , there must be a clearly-defined Wi-Fi security policy in place highlighting best practices on what is ( and is not ) allowed on the wireless network . This must be an extension of the cybersecurity documentation already in place with continual user education needed to ensure employees are aware of what is expected of them on the Wi-Fi environment .

THANKS TO THE EVOLUTION OF TECHNOLOGY , SETTING UP AN OFFICE WIRELESS NETWORK HAS BECOME VIRTUALLY A PLUG-AND-PLAY EXERCISE .

28 INTELLIGENTCIO www . intelligentcio . com