Wireless Network Security: Setup, Issues and Threats news, help and research - SearchSecurity.co.UK

Wireless Network Security: Setup, Issues and Threats

Email Alerts

Register now to receive SearchSecurity.co.uk-related news, tips and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
  • Infosecurity 2012 Europe: Conference news and highlights

    Get the latest news and important research from the Infosecurity 2012 Europe conference, including coverage on security threats and data breaches. 

  • IT in Europe, Security Edition: Smartphone security issues

    How can security teams manage devices they don’t control? Find out how to manage smartphone and tablet security threats. 

  • Roundup: University case studies on innovative security products

    Browse this collection of university case studies from colleges that have successfully implemented innovative security products. 

  • Information Security Learning Guides

    A repository of our Learning Guides. 

  • Wireless security: Knowledge is power

    Don't let Wi-Fi become the weak link in your network's armor! Learn the business risks posed by wireless, essential countermeasures that can reduce those risks, and industry best practices for designing, deploying and monitoring secure WLANs. 

  • Wi-Fi vulnerability assessment checklist

    Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions. 

  • Defeating Evil Twin attacks

    Evil Twins pose a clear and present danger to wireless users on public and private WLANs. This tip describes steps that you can take to defend users against this poorly-understood attack. Learn why SSL or SSH may not be enough to protect your users a... 

  • Getting from here to there: WPA2 migration

    WEP has been cracked, WPA is a band-aid, and your CSO recommends upgrading to WPA2. Great, but that's just not going to happen overnight. How do you migrate your installed base of legacy equipment? This tip recommends a workable strategy for migratio... 

  • Combining 802.1X and VLANs for WLAN authorization

    Many WLAN owners know that 802.1X/EAP makes it possible to authenticate individual wireless users. But did you know that 802.1X can also be used to funnel wireless traffic onto VLANs, enforcing user or group-based permissions? This tip explains how t... 

  • The ins and outs of AP placement

    Many installers make the mistake of treating 802.11 WLANs just like Ethernet, placing access points (APs) in locations that facilitate outsider access to corporate networks. But, from a security perspective, WLANs should be treated like the Internet ... 

  • See more Essential Knowledge on Wireless Network Security: Setup, Issues and Threats
About Wireless Network Security: Setup, Issues and Threats

Get advice and information on how to build and setup wireless network security to avoid wireless security issues and threats like hacking. Prevent network problems and learn how to securely set up your wireless network.