The advancement of computer technologies has served as the basis for the evolution of organizations. In recent years, the proliferation of wireless technologies has made it possible for employees to work more independently, in some cases eliminating the need for an office. These advances have been so profound that they are reshaping the way in which organizations conceptualize their growth and development.While the development of wireless technologies has clearly been a boon for both employees and organizations, for information technology (IT) professionals, the proliferation of wireless technologies has brought considerable concern and worry. This is because, despite the utility of wireless technologies, the ability to maintain security on wireless networks continues to remain a pervasive challenge for IT professionals. Thus, at a time when wireless technologies are proliferating in the organization, IT professionals must clearly identify and define the safety protocols that can be used to protect the integrity of the organization's vital information. If steps are not taken to ensure the security of wireless technologies, the organization could face serious breaches of its internal data.
[...] For this reasons, information technology professionals must consider the specific security steps that can be utilized to ensure that the organization's data is protected. Without clearly defined protocols for wireless security in place, the organization may face considerable problems dealing with unlawful access to the system. Solutions for Security on Wireless Networks Encryption Among the most notable issues that must be addressed in the context of wireless security is that of encryption. Scholars examining the transmission of data across wireless networks note that while most users assume that the data they are sending across the network is encrypted, and thus secure, in most instances, plaintext data is being sent. [...]
[...] Savarese goes on to argue that while security on the wireless network can be improved, the organization must address some compatibly issues in the context of developing these networks. Further, because of the extent of the security that is used to protect VPNs, widespread use by individual members can slow the network considerably. “Coverage is spottier and the network is slower. Wireless users need session persistence, link optimizations and compression for the network to be usable” (p. 39). These issues must be taken into consideration when implementing a VPN for the organization. [...]
[...] Personal Firewalls Bradley and Warring (2005) in their examination of the security protocols that should be used by organizations employing wireless networks argues that firewalls represent a formidable method for reducing security breaches. In particular, these authors argue that the use of a wireless network engenders certain problems that can be addressed by the use of personal firewalls: When you connect to a public wireless network you are joining a local network with other unknown computers. Having these computers on the same IP subnet makes them more dangerous than machines elsewhere on the Internet. [...]
[...] Antivirus Software Finally, Bradley and Warring (2005) argue that up-to-date antivirus software can improve the overall security and integrity of the network. These authors note that when a user connect to a personal network, they can operate with “fair assurance” that other machines on the network are protected against viruses and malicious code. However, Bradley and Warring note that: “When you connect to a public network you have no such assurance. Suddenly it is more important than ever to have antivirus software installed” (Complete guide Antivirus software can provide the rudimentary protection that is needed to ensure that the organization's network is not exposed to malicious code that can significantly impact data integrity. [...]
[...] Wireless Security Issues—An Overview In order to begin this investigation, it is first helpful to consider the specific challenges that exist when it comes to the security of wireless technologies. Breeding (2002) in his examination of wireless technologies in the organization notes that, wireless network operates just like a traditional LAN, except without the wires. Instead it uses signals transmitted over radio frequencies to enable computers to communicate with one another” (p. 42). This author goes on to note that the organization must establish an access point for individual users to access the network. [...]
using our reader.