Ensuring Security for Wireless Guest Access

Internet connectivity in offices, hotels and scores of other public places is no longer considered a luxury; it is a requirement. While providing wireless internet access improves customer satisfaction and increases brand loyalty, it also serves the important role of enhancing business productivity. Three essential issues must be addressed to ensure that an organization provides a secure and reliable wireless experience: admission control, user permissions and management. Admission control is established so only authorized guests are granted access. Four general methods are utilized for controlling access to a wireless network and their advantages and disadvantages are in the downloadable white paper below. In addition, user permissions serve to constrain resources that guests can access while connected to the wireless network. Customized security and compliance policies along with controls designed to distinguish between guest and corporate traffic ensure that sensitive and proprietary information remains safe and secure. Lastly, optimal wireless guest access management is achieved with a centralized interface where bandwidth usage is limited and the network is configured and easily monitored and managed.

Download

Integrating Tablets into Enterprise Wireless Networks

Tablets enable mobile access to sensitive data and their portability almost guarantees users will travel with the data between home, office and beyond. Therefore, organization administrators managing wireless networks must find a way to ensure security for the device and the network and protect sensitive data while simultaneously providing the proper network experience for all end users. Mobile device security depends on passcode policy options and can range anywhere from simple minimum passcode character length to passcode aging and setting a maximum of failed passcode attempts. Data can be kept safe with various methods to permanently disable a lost tablet which can be initiated in a variety of ways. Tablets incorporate a myriad of supported standards for authentication, access and wireless security, including on-premise and remote access. This ensures a seamless integration into existing environments with already robust security policies and procedures. In addition, it is imperative that the wireless infrastructure be ready for the tablet: adequate coverage of areas, increased network traffic capabilities and increased bandwidth demands. In order to deliver a secure, reliable and high-performing wireless network a Cloud Controller is utilized and with it comes centralized, network-wide monitoring and management via the web, thus eliminating the need for on-site IT.

Download

HIPAA Compliance for the Wireless LAN

Implementing a HIPAA-compliant network infrastructure is defined and dictated by the Administrative Simplification rules located in Subtitle F of Title II of the HIPAA law. Under these rules three types of security safeguards are mandated for compliance: administrative safeguards, physical safeguards and technical safeguards. The administrative safeguards relative to the wireless LAN are predominantly concerned with how private health information is handled. Therefore log-in monitoring, password management, data back-up and recovery and an emergency mode operation plan are the main administrative safeguard implementation specifications for the wireless LAN. The principal physical safeguards needed for compliance pertain to securing physical property and equipment from unauthorized physical access, tampering and theft. While administrative and physical safeguards are critical to HIPAA compliance, technical safeguards define the greatest number of implementation specifications impacting wireless LAN. Of paramount importance is authentication, integrity and encryption ensuring that information is accessed by a trusted user, not altered in transit and not stolen by an outside user. Furthermore, incorporating audit controls will enable a wireless LAN administrator to monitor and log user level events such as associations, authentications and bandwidth usage. Finally, unique user identification, emergency access procedures and automatic logoff features are additional specifications that must be addressed when implementing wireless LAN technical safeguards for HIPAA compliance.

Download

Small Business Networking

Effective technology is essential for small businesses looking to increase the productivity of their people and business. Introducing technology such as computer networks can help them to stay competitive by increasing productivity and by reducing hardware costs. Even simple networks make sharing information and resources easier, provide better security and enable easy backup facilities for any small businesses.

Download

Managed IT Services for Small Businesses

For small businesses in today’s high-tech society, Information Technology (IT) has become a significant consideration. Implementing new technology is a challenging job for small business owners and can cause numerous difficulties in day-to-day operations. Many small businesses are finding Managed IT Services as a solution to get the most from their IT investment.

Download

Small Business Mobility

Mobile technology is becoming increasingly vital to your small business as the number of employees working from home or away from office is growing significantly. More than 50 million US workers are considered mobile, spending at least 20% of the time away from their primary workspace. Some of your employees, such as your salespeople or representatives, may be constantly on the move.

Download

VoIP for the Small Business

Voice over Internet Protocol (VoIP) has become a viable solution for even the smallest of companies as broadband internet access has become affordable and much more widespread. VoIP offers a low cost alternative to expensive traditional phone services, and is rapidly becoming the communications system of choice to reduce telecommunications costs. Hosted VoIP services are also gaining popularity among smaller companies since these services do not require any investment in hardware.

Download

Web Collaboration

In today’s global business environment, the value of working together, or collaboration, can have a huge positive impact on your business. Your employees and teams need to work together, and share ideas and information across geographic boundaries. For a small business such as yours, effective collaboration is essential to improving productivity by empowering your employees to communicate and work more efficiently using the right communications tools.

Download

Outsourced IT

The relationship between small and medium-sized businesses (SMBs) and Information Technology (IT) can often be described as a “love/hate” relationship. You absolutely rely on technology to help your business run efficiently, but IT is most likely not one of your core competencies – and just keeping your systems running can be a major undertaking that distracts you from business-building activities.

Download