Back to : Blog
Themes  
Contact

Sase Sham, Inc.
216 WoodHampton Dr
White Plains, NY 10603-1920
718-930-1990
sase@wirelessautoswitch.com



Blog Management


Tags


Recent Comments

    There are no comments.



Purchase

Wireless AutoSwitch XPV
Add to Cart

Wireless AutoOff

Add to Cart

View Cart



Featured Blogs

Wireless AutoSwitch XPV 1.5.6.3 Released!

We just released XPV version 1.5.6.3.   This version speeds up the detection of USB devices added after the service starts.  Detection ...

Wireless AutoSwitch XPV 1.5.6 Released!

We just released Wireless AutoSwitch XPV version 1.5.6.  This version updates the code to recognize the new DisplayLink driver for USB Dockin...

Wireless AutoSwicth XPV 1.5.5.8 released!

We just released Wireless AutoSwitch XPV version 1.5.5.8.  This version fixes an issue when using some USB docking stations and adds the Start Di...

New Features in XPV 1.5.5.5

We have just released Wireless AutoSwitch XPV 1.5.5.5.  Here are the additions: 1.  Previously one needed to be an admin to run the "Wire...

Wireless AutoOff

We just wrote a variant of Wireless AutoSwitch that some may like and find useful.  It is called Wireless AutoOff.  The function of the appl...



Recent Blogs

Category: Corporate Security

Corporate Security


Sase Sham's avatar

Corporate Security regarding WiFi and Laptops

Corporate espionage is a far more serious and wide spread problem than at any point in the past and with the huge storage potential of even the tiniest of media it is now vital that corporations lock down their data security with the right combination of policy, IT support and threat awareness. Both laptops and wi-fi are major points of attack which require IT policies that address these potential vulnerabilities before problems happen and fault analysis after problems to make sure any issues are correctly fixed and prevented from ever happening again.

There are a number of methods to improve laptop security, the most obvious of which is a robust password policy and to educate employees about what is a strong password and concepts of password use. This means having a minimum password length and complexity that is enforced, along with changing the passwords after a set period of time to limit the vulnerability window of any undiscovered loss of security information. Teaching workers not to reuse a password and not to use the same password for multiple tasks as this is often used to escalate the seriousness of an attack, gaining access to a peripheral system before moving into more insensitive core systems. Ensure that laptops have a strong BIOS password and that the security provided by the manufacturer is strong. As with mobile phones there are now more sophisticated technologies available for dealing with lost laptops such as GPS tracking and remote wipe.

Engrave or tag the laptop in a way that displays the company name and contact details so that any lost laptop has a far greater chance of being returned to your business if it is left on a train or at a conference for example.

Choose an operating system that provides data security and make sure it remains regularly patched to close vulnerabilities as soon as they are discovered. This can be greatly enhanced with the addition of full disk encryption which will make lost data far less of a liability as if it is properly protected it will not be possible to discover what the data says.

Wi-fi signals can often be picked up far away from where the network or laptop is placed, allowing people outside a company to snoop on transmissions and potentially intercept passwords and sensitive data if the network is not properly locked down. They can also connect to laptops with the wireless card turned on and gain access to the corporate network. Good wi-fi security requires an encrypted protocol be used along with passwords and preferably an allowed list of devices with assigned IPs to add an extra layer of security. Make sure the security is up to date as even some encrypted protocols have now fallen to decryption attacks based on the processing power of a graphics card repurposed for number crunching. Most companies ignore the risk of the wireless cards on laptops so it is also important to turn off wireless cards when they are not in use.

In an increasingly security conscious world this is becoming a vital part of any IT provision for large organisations, especially those with commercially sensitive data or databases of customer details which would be a major breach of trust to lose and result in extremely bad press for that company. Every aspect of the corporate IT infrastructure from desktops to servers to laptops and mobile phones must be carefully considered for its security implications as more of these devices become ever more interconnected to make data as available as possible within the company to its employees.



Download - Latest Versions - Try Free for 30 Days
 TitleCategoryDescription
Wireless AutoSwitch XPVSoftwareWorks on Windows 10 , Windows 7, Windows 8.1, Vista and XP.
Wireless AutoOffSoftwareLatest version of AutoOff (Win7, Win8, Win10, Vista and XP)