Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Mobile

    Hot Spots: Dont Get Burned

    By
    Anne Chen
    -
    June 23, 2003
    Share
    Facebook
    Twitter
    Linkedin

      Convenience, low cost and increased productivity are driving users to wireless hot spots: Armed with little more than a laptop, an inexpensive wireless card and perhaps a credit card to access fee-based hot spots, users can jump onto a wireless hot spot and gain access to e-mail and other corporate resources.

      Public WLAN Best Practices

      As the availability of high-speed Internet access via wireless hot spots increases, IT managers can work to protect corporate data and mitigate risks with the following policies.

      • Use a personal firewall and anti-virus software.
      • Use a secure transport (such as IP Security, Secure Sockets Layer or Secure Shell).
      • Disable wireless cards when not in use.
      • Update and enable security software and operating system patches.
      • Do not reuse passwords for sensitive systems.
      • Set up secure Web browsing and instant messaging using an IPSec tunnel.

      Source: @Stake Inc.

      Wireless hot spots take Internet access to places it couldnt easily go in the past. But as any IT manager will attest, public wireless hot spots combined with 802.11 ubiquity (sanctioned or not) is a source of concern—mainly with security.

      Still, IT managers and wireless LAN experts say many of the dangers inherent in wireless hot spots are the same as those encountered when accessing corporate data beyond the firewall. And, they say, the productivity gains of anytime, anywhere Internet access far outweigh the potential disadvantages.

      “The huge number of hot spots that are starting to come online will really change the ways we think of and use the Internet,” said Keith Waryas, an analyst at International Data Corp., in a report released last year. “Very high-speed access, combined with the portability and mobility these new networks enable, will make the next few years a very exciting time for both business and consumer Internet users.”

      To stay ahead of trouble, IT managers need to take a proactive approach to hot spots: They should teach users how to securely access corporate resources and should develop and enforce hot-spot policies that are in line with those in place for remote access. A number of services designed to ease access are also coming online (see review).

      Mobile, Global Work Force

      Mobile, Global Work Force

      With the corporate work force growing more mobile and global, its no surprise that high-speed wireless Internet access has developed a mainstream following.

      IDCs Waryas estimates that more than 5 million consumers will access the Internet through U.S. wireless hot spots by 2006. And while cafes and airports now offer wireless Internet access, road warriors are expected to make use of wireless access most widely in hotels. Pyramid Research LLC, for example, expects roughly 25,000 hotels globally to offer wireless access by 2007 (see chart).

      At Company Finance Inc., in San Mateo, Calif., employees use nationwide wireless hot spots from T-Mobile USA Inc. to check e-mail on the road. The company has used GPRS (General Packet Radio Service) for access in the past, but Pankaj Chowdhry, president and chief technology officer of Company Finance, said GPRS coverage is not as reliable as the coverage he has come to expect from Wi-Fi hot spots.

      To ensure security, employees at Company Finance use Windows Terminal Services, said Chowdhry, who is also an eWEEK Corporate Partner. Terminal Services supports 128-bit bidirectional encryption between the server and the client using RSA Security Inc.s RC4 encryption algorithm. The same security methodology is in place for Company Finance employees using a wired hotel broadband connection.

      Vulnerable to Attack

      Vulnerable to Attack

      Wireless hot spots are vulnerable to eavesdropping and man-in-the-middle attacks, which is why IT managers who allow employees to transfer data outside the corporate firewall should authenticate users and enforce encryption. Virtual private networks already in place should be used to secure Web browsing and the transfer of information, whether its via instant messaging or e-mail.

      At the Web site of Edmunds.com Inc., an automotive information source, employees are asked to follow the same security policies when accessing public hot spots as they do when using a dial-up connection.

      “I dont have any restrictions, but there is a standard set of policies users are expected to follow,” said Angelo Kapitsas, a network engineer at Edmunds.com. “It shouldnt matter how theyre accessing data, as long as it stays secured.”

      For example, employees are expected to keep passwords private, run anti-virus software and close browser windows when a Web session is complete, said Kapitsas. With these policies understood, employees who have wireless cards are free to access e-mail secured by standard Secure HTTP using any Web browser.

      “There are chances that data could be wirelessly intercepted, but if users are accessing corporate resources from a public hot spot, that data is encrypted,” said Kapitsas, in Santa Monica, Calif. “Im more concerned about people getting onto our network within our offices, to be honest.”

      Senior Writer Anne Chen can be reached at anne_chen@ ziffdavis.com.

      Anne Chen
      As a senior writer for eWEEK Labs, Anne writes articles pertaining to IT professionals and the best practices for technology implementation. Anne covers the deployment issues and the business drivers related to technologies including databases, wireless, security and network operating systems. Anne joined eWeek in 1999 as a writer for eWeek's eBiz Strategies section before moving over to Labs in 2001. Prior to eWeek, she covered business and technology at the San Jose Mercury News and at the Contra Costa Times.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×