Network Management Group, Inc.

People and Technology Working for You

(620) 664-6000    Remote Support
  • Home
  • About
    • Who We Serve
      • Accounting Professionals
      • Financial Institutions
      • Healthcare Providers
      • Small Businesses
      • Public Sector & Education
    • Testimonials
    • Authorizations & Certifications
    • Vendors & Partner Organizations
    • Careers
    • Events
  • Services
    • Managed IT Services
      • Remote Monitoring & Management
      • Firewall Security Management
      • Cloud Computing & Virtualization
      • Email Security Management
    • Data Backup & Disaster Recovery
    • Technical Support
    • Business and IT Consulting
  • Resources
    • Helpful Links
    • Brochures / Literature
    • Forms
    • Videos
  • Contact
  • Support

Safely Using Airport Wi-Fi

September 16, 2013 by webcare Leave a Comment

airportwifiHeading out of town to visit relatives during the Holidays is as traditional as turkey dinners, electronic gifts, mistletoe, and snowmen. But what many people do not look forward to is the hustle, bustle, and time-consuming activity of actually heading into, through, and out of airports. This year, more than ever, millions of travelers will be using the public Wi-Fi systems available at municipal and International airports around the world. You may be one of them. With your handheld device, your laptop, or your tablet computer, you’ll be checking on your flights, sending out email, or maybe even working on that report that you promised your boss by January 3rd. But how safe is the airport’s wireless security?  How do you protect yourself – and your private information – from identity theft, fraud, and other cybercrimes?

[Read more…]

Filed Under: Newsletter Tagged With: mobile, security, travel, Wi-Fi, wireless

Get smart about security

April 18, 2013 by webcare Leave a Comment

used with permission from HP Technology at Work

security

Congratulations, you’ve taken every step to secure data on your networks and PCs against increasingly malicious worms, Trojans and viruses. But don’t rest easy. All infrastructure elements, including printers, servers, storage, Wi-Fi networks and cloud computing are just as susceptible to surprising security threats. Forget them and your sense of security is nothing but a dream. Whether they’re criminals looking to blackmail your business, technically savvy vandals getting their kicks, revenge-minded former employees or even competitors, hackers all have one thing in common: they want to disrupt your business operations for money, other gain—or simply for fun. So, what can you do? Read on for some valuable tips to bolster your overall IT defense. Combined with regular and diligent employee training and education, these pointers can help you better spot and prevent disruptive security attacks.

Mobile dos and don’ts

More than large companies, small businesses are issuing or implementing bring-your-own device (BYOD) policies regarding smartphones, tablets and other mobile devices. The ubiquitous nature of such products can cause companies to assume that their business information safely resides on them. Wrong. Your IT department is responsible for protecting company data, regardless of where it’s housed. What to do? For one thing, businesses must set firm policies about what data are allowed on employee-owned devices. It’s also wise to weigh the relative safety of available smartphone operating systems and perhaps require data to be stored on an approved server or in the cloud.

Safe and secure storage

Servers and storage devices also present a unique set of security challenges. Denial-of-service (DoS) attacks, for example, can overload those running web applications and compromise network bandwidth, memory, CPU use and hard-disk space. Solutions like the HP ProLiant G8 servers deliver comprehensive data and client protection and security.

Working without wires

Wi-Fi networks aren’t immune from sabotage-minded attackers, either. Consider these dangers:

  • Weak personal identification numbers (PINs) allow the ability of any user to access any wireless network at will. A laptop-equipped troublemaker sitting in your parking lot might be able to hack into your important data this way.
  • Security gaps allow wireless users to snoop on each other’s networks.
  • Operating system flaws provide easy backdoor access to a single computer—or even up to an entire network.

Easy first steps to securing your network include simplifying network management, implementing clearly defined BYOD security policies and making rogue Wi-Fi access more difficult with services like HP TippingPoint networking security solutions.

Consider the cloud

True, the cloud improves server, storage and network access and is less expensive than physical systems. But with easy data-access comes serious confidentiality concerns. Careful monitoring, strict access control and encrypted data are among the best security measures, along with the use of a private, rather than a public enterprise cloud. IT infrastructure aside, simple password security is surprisingly often overlooked in developing an overall security plan. Increased password complexity, and the use of single sign-on and other technologies, is essential. Staying one step ahead of cyber criminals demands detailed development of security policies and processes. Proactive businesses that develop comprehensive security plans better ensure their own safety, integrity, reputations and bottom-line profitability.

Filed Under: Newsletter Tagged With: mobile, security, wireless

Topics

anniversary anti-virus software awards BYOD cloud Doug Elliot Ingram Micro leadership Microsoft mobile networking partners press release privacy Randy Johnston SaaS security small businesses smartphones soni mcclelland Steven Harper tablets travel virtualization viruses virus protection website Wi-Fi Windows 8 wireless

Categories

  • Announcements
  • News
  • Newsletter
  • Press Releases

Archives

  • May 2014
  • November 2013
  • October 2013
  • September 2013
  • June 2013
  • April 2013
  • February 2013

Contact Us

Network Management Group, Inc.
734 E 4th Ave
Hutchinson, KS 67501

(620) 664-6000

https://www.facebook.com/NMGI.KS/

 

Support

  • Remote Support
  • Client Access
  • Service Center

© 2023 Network Management Group, Inc.

 

Loading Comments...