Wireless Frequenty Asked Questions
- Why do I need to change the way I manage wireless right now?
Most companies have a wireless network with a single password that everyone uses to log onto wireless. This works great until you have to fire someone or until employees give your wireless password out to friends and family....imagine a random car outside your office after-hours using your wireless network.....
Few companies ever change their wireless password. It's a huge hassle when you do because everyone has to update every device they have connected to the network. Most companies choose to deal with the risk of an ex-employee accessing their network vs. go through the trouble to change the main wireless password.
-
What can people get to if we don't secure our wireless network better?
Everything! Servers, computers, laptops, tablets, phones, printers, scanners....anything connected to your newtork. You might think it's not a big issue if someone accesses your printer or scanner, but many of these devices keeps a copy of what is printed/scanned for a certain amount of time or until those images are deleted. If you scan documents with confidential information, this could be an issue.
You might also think it's not a big deal if someone can access your office phones, but if someone is able to access them and enable recording to the device locally, this could be an issue. Normally this requires plugging a USB drive into a phone, but if someone is trying to steal information from you then they might find a way to gain access to the phone long enough to plug a small USB drive into it. Some USB driver are about 1"x1" - super small!
-
How can old employees get on my network?
If you don't change the password to your wireless network, anybody who has that password can connect. We have seen people sit in an office building lobby, a bathroom, or in a car outside of a building and use the wireless network of a company they used to work for.
-
Why would I want to give temporary access to short-term consultants?
Short-term consultants should have limited access to your network and data. Once their contract ends, they should no longer be allowed to connect to your network. You risk a data breach (someone copying your data and using it themselves, selling it to your competition, or posting it online for everyone to view). Securing your network so consultants only have access while they are working for you helps secure your data.
-
Why is it important to know who logs onto our wireless network?
Making sure that only people you want to access your wireless network is the first step in preventing data from being stolen, deleted, or corrupted. If you know exactly who has the ability to log onto your wireless network, then you greatly reduce the risk of data corruption or breaches.
-
Are you sure an ex-employee will not be able to get back on our wireless network?
The only ways an ex-employee could gain access to your wireless network would be to either log in with guest credentials (which should not have access to your data), or log in with another valid employee's information. Due to this, it is very important that employees not share their wireless login details.
-
How hard is it to set up individual usernames & passwords for each user on our wireless network?
It's super simple! We give you access to a website portal that allows you to add users and assign passwords. You can delete users that should no longer have access and add them back at a later time if needed. If you can fill out a short form, then YOU CAN manage your wireless network!
-
Do you have a Network Engineer I can speak with?
Our highly experienced Network Commander technicians help large and small organizations plan full build outs, remodels, equipment refreshes, and core network changes.