SHARE
Facebook X Pinterest WhatsApp

Report: Many Companies Lack Wi-Fi Security

Written By
thumbnail
Colin C. Haley
Colin C. Haley
Jun 26, 2003

BOSTON — In a rush to improve productivity, many enterprises have overlooked the need to secure the flow of data over their wireless local area networks , according to new research from Jupitermedia’s research arm.

The study, released here today at 802.11 Planet Conference & Expo, finds that only 28 percent of enterprises are using point-to-point virtual private networks . Meanwhile, the next Wi-Fi standard, which includes security measures, is yet unratified.

“Many enterprises rely purely on ‘off-the-shelf’ solutions with basics such as (Wired Equivalent Privacy) with either manual or automated rotation of keys, restricted (service set identifier) service set identifier) access or MAC-based device authentication,” said Julie Ask, a Jupiter Research senior analyst.

In general, larger enterprises take WLAN security more seriously than their smaller counterparts, Ask said. Comprehensive network security can cost tens of thousands of dollars and smaller companies can’t afford it, Ask said.

But as the number of people with Wi-Fi PC cards continues to grow so do the potential threats of someone breaching corporate networks.

The findings could represent an opportunity for equipment vendors and service providers. Several are addressing the issue, including Nortel which recently introduced a WLAN portfolio that includes a number of security features. Service providers are also adding wireless security installations and integration as part of their offerings.

Jawad Khaki, Microsoft’s vice president of Windows networking and communications, said one of the company’s recent user surveys indetified security as the top concern in adopting Wi-Fi.

“Connected all the time means all the time under attack,” Khaki said in his keynote address. “Security is important. . . and it’s still evolving.”

Khaki stressed the importance of wireless industry hardware and software makers to adopt standards, saying the goal should be to have wireless access be like plugging a phone into a walljack — simple, reliable and secure. A uniform structure will allow developers to build advanced media applications, which will spur growth.

“Proprietary protocols are adding to the confusion,” Khaki said.

Editor’s note: Jupitermedia Corp. is the publisher of this Web site.

Recommended for you...

Does Meta Have a Death Wish?
Rob Enderle
Apr 14, 2022
HP Buys Poly and Moves to Dominate Desktop Communications
Rob Enderle
Mar 31, 2022
Ossia’s Wireless Power: The Most Revolutionary Technology You’ve Never Heard Of
Rob Enderle
Mar 25, 2022
Wyebot: The Increasingly Automated Solution for Wireless Networking
Rob Enderle
Mar 11, 2022
Internet News Logo

InternetNews is a source of industry news and intelligence for IT professionals from all branches of the technology world. InternetNews focuses on helping professionals grow their knowledge base and authority in their field with the top news and trends in Software, IT Management, Networking & Communications, and Small Business.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.