sb-nz logo
Story image

Tips for securing wireless networks in the IoT era

03 Aug 2016

Look up digital disruption in the dictionary and it’s likely you’ll see the Internet of Things (IoT) sitting there proudly as an example.

Organisations must make strategic changes to effecvtively secure wired and wireless LANs while supporting business applications for use on mobile and desktop devices alike. What does this mean? According to Wavelink, it’s all about a ‘mobile-first’ mentality.

“IT organisations face constant change, which only seems to be speeding up with technology transformations such as the Internet of Things (IoT), anything-as-a-service (XaaS), and artificial intelligence,” says Ilan Rubin, Wavelink managing director. “Security has always been important but it has become more complicated to secure wireless networks in the face of these new technologies. “Deploying ad hoc security is no longer good enough; enterprise networks need a secure access architecture for end-to-end protection.”

According to Rubin, there are three key steps IT teams should follow to improve security:

1. Review access layer security

The addition of IoT devices introduces all new security challenges, with unsecured wireless devices being connected to networks. The burden is on the network to keep these devices secure and prevent hacking from cybercriminals.

2. Consider new access layer defence strategies

While most organisations do already have basic defences in place, many lack intrusion prevention and application control to provide maximum protection. Technologically, companies should have multiple layers of defence – like internal network segmentation, wireless intrusion protection and next-generation firewalls – which makes it difficult for attackers to spread widely across the network.

3. Select a secure WLAN solution

The security solution that organisations choose should include an integrated wireless solution where control and security are combined in a single portfolio.

“Companies should look for the most flexible WLAN options to mix and match deployment models for different use cases, locations, and IT resources,” Rubin says. “The solution you choose needs to match your network and organisational structure, delivering the functionality and access you need without sacrificing protection. An integrated, end-to-end solution is more secure, scalable, and cost-effective than piecemeal solutions.”

On top of that, Rubin affirms that IT administrators need a ‘single pane of glass view’ now more than ever, which will simplify the deployment and management of enterprise networks, applications and devices.

Story image
Video: 10 Minute IT Jams - SonicWall VP discusses the importance of endpoint security
In this video, Dmitriy discusses the exposure points and new risks that come as a result of widespread flexible working arrangements, how organisations should secure their massively distributed networks, and how SonicWall's Boundless Cybersecurity model can solve these issues.More
Story image
Google Cloud observes spike in DDoS volumes in last two years
Google Cloud has seen an ‘exponential’ rise in distributed denial of service (DDoS) attacks over the past decade, but the biggest attacks have only occurred in the past couple of years.More
Story image
The three-pronged security approach that confronts security breaches head-on
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.More
Story image
Unbound seeks channel growth with new partner programme
Those who sign up will have access to Unbound’s security solutions, sales and partner enablement, deal registration and partner portal.More
Story image
Acronis expands global data centre network, including new facilities in NZ
The expansion ensures that the full range of Acronis Cyber Protection Solutions will be available to partners and organisations around the world.More
Story image
Microsoft: Digital transformation doesn't make SMEs immune to cyber threats
Ricky Kapur warns that despite digital transformation every business is at risk - no matter how large or small they are.More