Who's Reaping the Benefits of WiFi?

September 2008
Security: Solutions for Enterprise Security Leaders;Sep2008, Vol. 45 Issue 9, p127
Trade Publication
The article presents a survey on the benefits of WiFi. The study examined Federal teleworkers, non teleworkers, and Federal information technology (IT) executives' attitudes toward wireless Internet and the state of wireless Internet security. Eighty-three percent of Federal IT executives say wireless Internet can be secure, only 68 percent note their agencies are providing wireless security protocols.


Related Articles

  • Wireless Computing Technology. Wilkie, LeAnn; Mensch, Scott // Global Education Journal;2012, Vol. 2012 Issue 3, p1 

    The article discusses research which examines wireless security behaviors of college graduate and undergraduate students. The study revealed that many students do not appreciate the security issues and vulnerabilities that are associated with mobile Internet access. It indicated that the...

  • Managers concerned about wireless security dangers.  // Manager: British Journal of Administrative Management;Summer2007, Issue 59, p9 

    The article reports on the results of a survey that polled several hundred business organizations in Great Britain on the subject of computer security. According to the poll, a significant number of British companies do not enforce their security policies on wireless communication systems. A...

  • Wireless craze takes hold. Fielding, Michael // Marketing News;12/15/2004, Vol. 38 Issue 20, p14 

    Reports on the growth of wireless Internet access in the U.S. as of December 15, 2004. Main reason for the growth; Remarks from Julie Ask, research director at Jupiter Research, on the issue; Use of wireless communication system in the marketing field.

  • Welcome to the workplace of the future. Berkeley, Regus // Business Traveller (UK/Europe Edition);Jul/Aug2009, p24 

    The article reports on mobile, flexible, global workplace models that provide twenty- four-hour, seven-days-a-week business lounges and meeting spaces for mobile workers. The Regus Berkeley Square in London, England is home to this concept that features world class information technology,...

  • CAN YOU SQUARE THE CIRCLE? Mohamed, Arif // Computer Weekly;9/19/2006, p36 

    The article focuses on the importance of enhancing Information Technology security to protect computer networks and application while accessing them. ADP is a company that provides services to other companies. It deals with human administration, so security is an important issue for it. ADP...

  • Network security controls struggle to keep pace with wireless devices. Ashford, Warwick // Computer Weekly;7/31/2012, p7 

    The article discusses the proliferation of mobile wireless devices accessing corporate networks and the accompanying security challenges presented to chief information officers. Topics include the rise in bring your own devices schemes, the consumerisation of information technology, and the...

  • Can we get the data security balance? Watts, Mark // Computer Weekly;10/21/2008, p8 

    The article focuses on the RSA survey on data security in companies and government agencies. The RSA survey found that although 94% of respondents were familiar with their organisations' information technology security policies, 53% felt that they had to work around them to carry out their...

  • A TALE OF TWO (WIRELESS) CITIES.  // SC Magazine: For IT Security Professionals;Aug2005, p41 

    This article presents a case study about location-enabled system security. John manages a wireless network and runs NetStumbler on his laptop to scan for rogues and identifies 19 access points. Four are the access points and nine are known to belong to neighbors. On Monday, John wanders the...

  • THE LAN, PAN, WAN PLAN. Brooks, Jason; Bethoney, Herb // eWeek;01/15/2001, Vol. 18 Issue 2, p48 

    Reports on the importance for information technology departments to evaluate the effects of wireless networking on system security. Integration of wireless security into established security frameworks; Description of different wireless networks. INSET: Beware of chinks in wireless links, by...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics