BYOD

Cutting the Cord…

Over the last twenty years, wireless has gone from a novelty to a necessity. Providing a wireless network is what encourages worker mobility as well as mobility of thought. But the challenges the wireless network present are daunting. Implementing security properly is paramount when designing and implementing a wireless LAN (WLAN). An organization needs to determine how to address Guest and BYOD postures while keeping known devices and users segregated from the rest of population.

Identity Management

Identity Management and Network Access Control

We hear about a new major security breach almost every week. Some of them rely on weak keys to do so. In the famous TJ Maxx breach, it is believed the hackers exploited a weak pre-shared key for Wifi. Had they been using WPA2-802.1x the key would have been infinitely stronger. This means the hackers would need to be in the same location for a longer period time and potentially dissuading them from continuing the hack. Even if they stuck around, it would have been obvious to staff that a car was lurking around for too long. Identity management would have helped to enable 802.1x and Radius, which generates unique keys and regenerates them in shorter intervals.

Wife for rookies

Wifi for Rookies

WiFi for Dummies sounded too cliche and I suspect is a registered trademark, so I am going with WIFI for Rookies. This topic reminds me of when my old friend and former governor of California called me asking for help understanding WiFi. He explained that although he had played superheroes, he was not actually a superhero nor was he extremely technical.