Let us understand how a wireless network works initially.
1)The wireless network sends its signals
through the air upto some range in a company's internal wireless
network.
2)The device which is in that particular range
can pull that signal and access the internet.
3) If we don't take necessary precautions, any
device within that range can access our network.
Now, let us understand how to prevent unauhorized
access and how it's configured
- we should use encryption on a wireless network
i.e., we should encryption which is being sent over the network.
Encryption makes the information you sent into code which can not
be accessible by others.Your computer, router, and other equipment
have to use the same encryption.Eg:-WPA2 encryption.
- We should limit the access to the network.All
the deIvices which are able to communicate with a network are
assigned a unique MAC address so that routers can allow only
devices with particular MAC addresses to access to the
network.
- It is also important to secure a router as it
is the communication between a local network and internet.The
router can be kept secure by changing the preset password of
router,updating your router time to time,logging out as admin to
avoid piggyback of sessions and also disable remote access to
desktop features
- Apart from all the above steps, we should follow the
basic steps of protecting our computer like having
an antivirus, firewall and antispyware etc.
- Also use strong passwords to access the
network.
The policies might need to be created and enforced to
ensure employee compliance are as follows:-
- It is important to have the security procedures written
down in order to understand and you make them easily
accessible for every employee.
- Make some mandatory courses for every employee
to make them understand each and every security policy and conduct
time to time assignments or quiz on the same.
- Make employees understand why security procedures are
necessary.Give them some reasons and examples on the
same.Tell them following those procedures are a part of company
success.
- Whenever an employee wants to view the security policies and
procedures, make sure that they are easily
accessible through a link or a web application in your
network and use digital documents to make sure all
policies and procedures are easily accessible for every
employee.
- Provide Timely remainders to employees to view
the latest updated security policies through mails or personal
communication. If possible reward all the employees who strictly
follows security procedures because of which others may get
inspired.