Unsecure or Secure: The Network Security Challenge for Small and Mid-Size Businesses

I hope you all have had the chance to read my previous post in our small and mid-size business-focused blog series about challenges and benefits associated with integrating wireless technology into your small or mid-sized business, in order to grow business and increase operational efficiency. In this blog, I’d like to expand a little further on wireless security, the implications it has for SMBs and the role network security plays in the future of bring your own device (BYOD).

As more and more small and mid-size businesses decide to integrate wireless network connectivity into their business models, it will be critical that they find the proper method of securing this network in order to safeguard against cyber-attacks and hackers. Because of the flexibility and ability to connect-from-anywhere in the office, wireless networks are often more vulnerable to attacks. Threats to your wireless network can come from outside of the network, meaning hackers do not need to be physically connected (wired) to your network to access it. Left unsecured, wireless networks can be targets of “packet sniffing” and “war driving.”

Packet sniffing involves the act of capturing packets of data flowing across a computer network. War driving involves an unauthorized person hacking your company’s wireless network and gaining access to important information. These are both realistic problems your company could face if your network is open or not adequately secured. These threats can be especially devastating, as they can compromise your business’ ability to let employees freely share information internally across the network. A wireless security solution is absolutely critical.

In order to ensure the security of the wireless networks you have in-place, it’s important to understand the necessity of integrating business-grade access points instead of residential access points. Residential access points don’t provide adequate security and most do not support 802.1x authentication, but only a pre-shared key, making the network vulnerable to aforementioned packet sniffing and war driving. These residential-grade access points are unable to detect rogue (unauthorized) AP’s, or provide wireless intrusion prevention (WIPS), whereas business-grade access points are able to provide these increased security protocols as well as peace-of-mind for your everyone in your business. It’s extremely important for businesses to protect information communicated between APs and the network.

Keeping your business’ wireless network secure should be top priority and again, using outdated protocols for wireless security, like WEP (Wired Equivalent Privacy) should be avoided as best as possible. Today, small and mid-size businesses have access to newer, safer alternatives for network security, so it should never be an afterthought. Securities such as WPA (Wi-Fi Protected Access) and WPA2 help safeguard against hackers and are providing necessary security precautions. Proper security measures, such as virtual private networks (VPNs) for remote access and the IEEE 802.1X standards-based Cisco Wireless Security Suite for WLANs, not only protect against security risks, but also reduce costs and enhance productivity of the network.

Wireless network integration has proven to be essential for the small and mid-size business market and continues to find its way into more and more businesses. By properly deploying wireless network security, your business will be enabled to keep networks safeguarded and will prevent the loss of important information crucial to the business, especially as more employees begin to bring their own devices to work and connect them to the wireless network.

In our next post, Gary will take a look at BYOD, the current interest level surrounding this subject and how companies are being forced to adapt their business models (and quickly) to accept this rising trend. We will discuss the necessary infrastructure that must be in place to support BYOD and the theme of mobile device management (MDM). Again, network security will surely remain a centerpiece for the BYOD conversation as companies begin putting a proper strategy in place and network capacity becomes an issue.

If you have any questions or thoughts concerning wireless or other technology challenges pertaining to small and mid-size business, please feel free to share them below or contact me directly via email at askrod@external.cisco.com. I always appreciate your feedback.

About Rod Scotland

As the national architectures strategy manager of mid-market solutions for Cisco Canada, Rod Scotland is responsible for leading the technology alignment and national technology strategies for Canadian midmarket and SMB solutions. Since joining Cisco in 1999, Scotland has held several positions in the areas of consulting engineering, solution selling and strategic business development. He has extensive experience with Cisco technologies and has provided expertise across the Customer and Partner Led business segments. Prior to Cisco, Scotland worked in data networking at Digital Equipment Corporation (DEC). He then held a position as a convergence expert with Lucent Technologies where he provided enterprise solutions to Fortune 500 companies. Scotland majored in general business and information systems management at Mohawk College. À titre de directeur de la stratégie nationale des architectures de solutions destinées aux marchés d’entreprises de taille moyenne chez Cisco Canada, Rod Scotland est responsable de la direction de l’alignement des technologies et des stratégies nationales en matière de technologie pour le marché des entreprises canadiennes de taille moyenne ainsi que des solutions destinées aux petites et moyennes entreprises. Depuis qu’il s’est joint à Cisco en 1999, M. Scotland a occupé divers postes à titre d’expert-conseil en ingénierie, ventes de solutions et développement stratégique des affaires. Il détient une expérience étendue des technologies Cisco et a offert son expertise dans les segments clients et les segments de marché pilotés par les partenaires. Avant d’être chez Cisco, M. Scotland a œuvré dans le domaine de la mise en réseau de données chez Digital Equipment Corporation (DEC). Il a ensuite occupé le poste d'expert en convergence chez Lucent Technologies où il offrait des solutions d'entreprises aux sociétés du Fortune 500. M. Scotland a obtenu un diplôme en administration générale et en gestion des systèmes d'information au Mohawk College.
This entry was posted in Small and Mid-size Business and tagged , , , , , , , , , , , , , , , , , . Bookmark the permalink.

5 Responses to Unsecure or Secure: The Network Security Challenge for Small and Mid-Size Businesses

  1. Pingback: Investors Increase Funding for Big Data Start-Ups | expertIP

  2. Pingback: AVA pour PME: passer des défis aux occasions | Blogue de Cisco Canada

  3. Pingback: BYOD for Small and Mid-Size Business: Moving from Challenge to Opportunity | Cisco Canada Blog

  4. Pingback: Wordpress site: Unsecure or Secure: The Network Security Challenge for Small and Mid-Size Businesses

  5. Pingback: Is your small business ready for a mobile workforce? | Cisco Canada Blog

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s