Whether or not you've deployed wireless networks, they're a threat. Fight back with these eight steps. Take one look at the tangle of cables connecting the computer to its monitor, peripherals and printers, and it's not hard to imagine how someone thought "wireless." Sample the wireless 802.11b network (a.k.a. Wi-Fi and AirPort) in a café after crawling around on your hands and knees underneath your desk trying to find a live Ethernet port.. . .
Whether or not you've deployed wireless networks, they're a threat. Fight back with these eight steps. Take one look at the tangle of cables connecting the computer to its monitor, peripherals and printers, and it's not hard to imagine how someone thought "wireless." Sample the wireless 802.11b network (a.k.a. Wi-Fi and AirPort) in a café after crawling around on your hands and knees underneath your desk trying to find a live Ethernet port.

You're hooked.

All this has Corporate IT asking: "Should we invest in wireless networks? Are they secure enough?"

Whether or not IT supports wireless, users are already using it, leaving IT and security managers to try and cope.

"You have to realize that the business world is going to adopt technology and if you're the security guy saying you can't do that, you're going to be run over by a herd of buffalo," cautions Jim Wade, chief security officer and business continuity officer for the Federal Reserve System, and also the president and CEO of ISC2, a security education organization.

The link for this article located at Enterprise Systems is no longer available.