Wifi Security

Wifi Security


Whenever you communicate over the Internet using a wired or wireless connection, you may want to ensure that your communications and files are private and protected.

If your transmissions are not secure, you take the risk of others intercepting your business e-mails, examining your corporate files and records, and using your network and Internet connection to distribute their own messages and communications.

 

 

When data reaches the access point or gateway, it is unencrypted and unprotected while it is being transmitted out on the public Internet to its destination --- unless it is also encrypted at the source with SSL when purchasing on the Internet or when using a VPN.

So while using WPA will protect you from external intruders, you may want to implement additional techniques to protect your transmissions when you use public networks and the Internet.

Extended EAP (Extensible Authentication Protocol) is an addition to the Wi-Fi Protected Access- (WPA?) and WPA2? - Enterprise certification programs, which further ensures the interoperability of secure Wi-Fi networking products for enterprise and government users.

WPA2 (Wi-Fi Protected Access 2) provides network administrators with a high level of assurance that only authorized users can access the network.

Based on the ratified IEEE 802.11i standard, WPA2 provides government grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2 compliant AES encryption algorithm.

WPA2 - Enterprise verifies network users through a server.

WPA utilizes 128-bit encryption keys and dynamic session keys to ensure your wireless network's privacy and enterprise security.

For more information on WPA, visit the WPA Web page.

Visitors to the company, as well as mobile workers, can still have unfettered access to the Internet and use standard e-mail protocols.

However, VPN access, which enables access to the corporate network, corporate e-mail and communications systems, is provided only to those who've been given authorization.

Hardware and software firewall systems monitor and control the flow of data in and out of computers in both wired and wireless enterprise, business and home networks.