Wireless Nets Keep Security Crews on Their Toes

You know that dream—the one where you’re up on a stage in your underwear and everyone’s staring at you? To some information-technology managers, keeping a wireless network secure evokes the same feeling of vulnerability.

There’s a basic reason for this sense of exposure: Radio signals can’t be confined to the walls of an office building. The wiring for conventional networks can be physically locked behind closed doors or sealed into walls. But wireless data bounces into the open air, and somebody with the right equipment in the parking lot or the building next door could get into an improperly secured wireless network and see things that are supposed to be secret.

Wi-Fi, the industry’s marketing term for the technology that runs most wireless data networks, is as common today as double lattes. The hardware necessary to connect to Wi-Fi networks

is built into most laptops sold today, and service providers have set up Wi-Fi hot spots at airports, hotels and coffee shops around the globe. Hackers have even coined a term (“wardriving”) for cruising around in a car with a wireless laptop to find unsecured networks.

Naturally, the people who protect wireless networks live in a state of constant vigilance. “We’re trying to keep a paranoid vision of how many patient records we fling through the air,” says Steve Champion, the senior data security analyst for The Methodist Hospital System in Houston.

4 TIPS FOR SECURING WIRELESS DATA
1. Monitor who’s using the wireless network. Set guest accounts to expire after, say, 24 hours.
2. Audit the network regularly. Check security with tools that scan for vulnerabilities and detect “rogue” access points plugged into the network.
3. Update equipment to the latest security standards. Experts
say an older standard like WEP can be cracked easily if it’s incorrectly deployed.
4. Add security in layers. For especially sensitive data, require that applications be accessed only via virtual private networks, in addition to using Wi-Fi security measures.

Champion must ensure that the wireless infrastructure at Methodist’s four hospitals—which includes more than 400 access points from Cisco Systems—isn’t compromised. “Right now, we have very, very strict policies of how the network is used,” he says.

Every device that connects to Methodist’s wireless networks must be authenticated by a system that assigns a unique alphanumeric key to the device each time someone logs on. The data is encrypted when it is transmitted between the device and the access point, so that even if someone managed to intercept the transmission, it would be scrambled.

Moreover, doctors or employees who want to go wireless must contact the data security department and sign a confidentiality agreement before they’re given access privileges.

But Champion still has worries. One concern is “rogue” access points that employees set up on their own without proper security. Last year, he scanned all of Methodist’s hospitals, walking around with a laptop for four days, and found 15 access points his team didn’t know about.

By the end of the year, Methodist plans to install a proactive monitoring system from AirDefense. The system uses sensors, installed next to each Cisco access point, to monitor traffic and identify unusual commands that may indicate a break-in attempt. As Champion explains: “We need to be able to look at our network the same way a hacker would look at it.”

Feeling stuck in self-doubt?

Stop trying to fix yourself and start embracing who you are. Join the free 7-day self-discovery challenge and learn how to transform negative emotions into personal growth.

Join Free Now

Picture of Baselinemag

Baselinemag

TRENDING AROUND THE WEB

8 tiny habits you don’t realize are stopping you from making close friends as an adult

8 tiny habits you don’t realize are stopping you from making close friends as an adult

Global English Editing

If a man constantly blames you for his failures, he’s hiding these 9 insecurities behind his accusations

If a man constantly blames you for his failures, he’s hiding these 9 insecurities behind his accusations

Small Business Bonfire

If you want to remain mentally agile as you get older, say goodbye to these 7 behaviors

If you want to remain mentally agile as you get older, say goodbye to these 7 behaviors

Global English Editing

People who were bullied in school typically display these 8 subtle traits as adults, according to psychology

People who were bullied in school typically display these 8 subtle traits as adults, according to psychology

Global English Editing

I let fear and self-doubt control my decisions. Here are the 8 daily habits that gave me real confidence

I let fear and self-doubt control my decisions. Here are the 8 daily habits that gave me real confidence

The Blog Herald

7 phrases narcissists use that sound polite at first but are actually disrepectful

7 phrases narcissists use that sound polite at first but are actually disrepectful

Global English Editing