Securing Enterprise Wireless Networks

US Department of the Interior failed its latest cybersecurity assessment

With the development of enterprise digital transformation and the increasing demand for BYOD, more and more companies establish wireless networks for accessing their internal business systems. As the company’s business scale continues to expand, the company’s business dependence on the network continues to increase. The gradual maturity of wireless network technology has enabled many enterprises to expand the deployment of wireless networks to cope with their daily office and customer reception and business consulting work. Securing access to the enterprise network and ensuring the normal operation of enterprise systems require effective wireless security protection solutions. Affected by the features of wireless networks, its security issues are becoming increasingly prominent, and there is an urgent need for secure access mechanisms to protect the customer service system of enterprises. The enterprise’s wireless network settings should meet the following specific requirements:

  • Wi-Fi secure access
  • Wi-Fi safe office
  • Wi-Fi fast Internet access
  • Wi-Fi fast roaming
  • Enterprise online behavior management
  • Visitor Security Management
  • Centralized management
  • Enterprise data protection

Here are some suggestions from the Cybersecurity and Infrastructure Security Agency (CISA) for minimizing the risks to your wireless network:

  • Change default passwords: As the default passwords are easily available to obtain online, using complex passwords can make it harder for attackers to access a device.
  • Restrict access: Only allow authorized users to access your network by restricting access to your network by filtering these MAC addresses.
  • Encrypt the data on your network: Using encryption protocols such as WEP, WPA, WPA2, and WPA3 to encrypt information being transmitted between wireless routers and wireless devices.
  • Protect your Service Set Identifier (SSID): Using default SSID could allow attackers to identify the type of router and possibly exploit any known vulnerabilities.
  • Install a firewall: Installing a firewall directly on your wireless devices, which is a host-based firewall, as well as on your home network, which is a router- or modem-based firewall.
  • Maintain antivirus software: Installing the antivirus programs with additional features that detect or protect against spyware and adware, and keeping your virus definitions up to date.
  • Use file sharing with caution: File sharing should be disabled when not needed, and never open an entire hard drive for file sharing and allow file sharing on public networks.
  • Access point software patched and up to date: Be sure to check the manufacturer’s website regularly for any updates or patches for your device.
  • Check your internet provider’s or router manufacturer’s wireless security options: Check the customer support area of their websites for specific suggestions or instructions.
  • Connect using a Virtual Private Network (VPN): VPNs allow employees to connect securely to their network when away from the office.

LIFARS Gap Assessment Solution is designed to ascertain your comprehensive information security, risk and compliance status (current). Not only we determine your current state along with your risk appetite and tolerance, but we also provide you with an actionable roadmap to reach target maturity level including strategy, structure, governance, and operations management plan. Leveraging our extensive knowledge and experience, our competent Assessors and Project Managers focus on the following to deliver optimal services for you:

  • Identify key business processes and associated information flow to ensure adequate threat modeling.
  • Identify and engage key stakeholders to ensure adequate information discovery.
  • Adhere to industry best practices and standards such as ISO, NIST, COBIT, and CIS.
  • Provide Assessment Workbook prior to onsite and remote observations and interviews to maximize productivity.
  • Optimally engage stakeholders for interviews and observations to minimize time impact.
  • Provide Roadmap, Strategy and Operations Management plan aligned with your risk appetite and tolerance.
  • Present findings to key stakeholders including executives to influence cultural changes.

 

Contact LIFARS Immediately For
Mitigating Cyber Risks in Your Organization

 

 


Credits:

https://www.us-cert.gov/ncas/tips/ST05-003