tech blog header

Free Whitepaper

Follow Us

Your email:

Blog Topics

Current Articles | RSS Feed RSS Feed

NIST Releases WLAN Security Guidelines

 
security guidelines

Before wireless networks were common, hackers needed to find a physical route into a company's systems.  Even when that meant using a dial-in modem, the possible attack routes were limited by the available technology.  The spread of wireless communications, however, has given malicious actors an unprecedented level of opportunity.  When this consideration is paired with the fact that WLANs, wireless local area networks, often possess weaknesses in their approaches to IT security, this can be a recipe for disaster.

Using IT Consulting to Deal With BYOD Challenges

 
byod

The practice of BYOD or bring your own device is a somewhat controversial one in business circles across the nation.  While employees may appreciate the convenience of using their own mobile phone for business as well as personal use, some companies are having second thoughts about this model.  Security concerns play a large role in the conversation, as does the issue of employees possibly using company time for personal email and other non-work uses.  This, of course, can become more frequent when a BYOD policy is in effect. 

Proliferation of Handheld Devices Necessitates Improved IT Support

 
blackberry

There is no doubt that integrating an employee's personal computing devices, items such as cell phones, BlackBerries, tablet computers, and laptops, with a business network can greatly enhance worker efficiency, allowing them to do more in less time.  It can also increase employees' ability to progress through workflow when they are out of the office, whether they are at home for the evening or out of the country on a business trip.  Unfortunately, the proliferation of handheld devices is placing a great strain on the Wi-Fi networks that businesses maintain to support their workflow.

Mobile Devices: Challenges They Produce At Work Without IT Solutions

 
Mobile Devices

As any IT manager knows, policies that instruct employees how to interact with technology will never be followed with 100 percent compliance.  Sometimes, in fact, such policies cannot be perfectly followed since technology itself may take some of the decision-making out of the hands of individual employees.  

All Posts