Wi-Fi and Future Network Security

Despite the development of new technological solutions allowing to work with information, the issue of digital security is among the critical problems in today’s business world. Business owners may consider the use of wireless networks as a convenient option since it allows making working practices more flexible, but these benefits significantly increase the risks of security threats. First of all, the decision to set up wireless networks for business purposes is associated with external threats related to the direct influence of malefactors and their software on the network (Ochang, Irving, & Ofem, 2016). Additionally, the personal devices of particular network users can be susceptible to harmful data.

Malicious software on specific devices can also compromise the safety of wireless networks by gaining unauthorized access to business data. In the majority of cases, threats to data safety are associated with loopholes in security protocols used in wireless business networks (Ochang et al., 2016). However, particular users’ careless attitudes to the prevention of security breaches also add to the issue (Ochang et al., 2016). Wireless security attacks are increasingly common today despite a range of data protection techniques. As an example, WeWork, a real estate business based in New York, made a mistake providing different devices with access to some clients’ financial data and contracts (Ng, 2019). The event’s consequences are difficult to analyze since the majority of companies whose documents have been exposed refuse to bring the case to public notice, and not all files contain sensitive information (Ng, 2019). The main thing to do to prevent such incidents is to select secure Wi-Fi passwords and avoid using similar or identical passwords at different locations.

The TJX Companies, a key market player in the retail industry, is another business that had to deal with the outcomes of security attacks. In 2005, the company relied on a wireless network using WEP despite multiple security concerns recognized by experts in the field (Vennamaneni, 2016). After a massive data breach due to hackers’ efforts, personal information of millions of cardholders was stolen, which resulted in months of legal wrangling (Vennamaneni, 2016). As for the measures to prevent such incidents, companies need to find better alternatives to WEP, delete unnecessary data on time, and rely on effective encryption methods.

References

Ng, A. (2019). WeWork’s weak Wi-Fi security leaves sensitive documents exposed. CNET.

Ochang, A. P., Irving, P., & Ofem, O. P. (2016). Research on wireless network security awareness of average users. International Journal of Wireless and Microwave Technologies, 6(2), 21-29.

Vennamaneni, M. (2016). Security breach at TJX – analysis. Medium.

Cite this paper

Select style

Reference

StudyCorgi. (2021, June 12). Wi-Fi and Future Network Security. https://studycorgi.com/wi-fi-and-future-network-security/

Work Cited

"Wi-Fi and Future Network Security." StudyCorgi, 12 June 2021, studycorgi.com/wi-fi-and-future-network-security/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2021) 'Wi-Fi and Future Network Security'. 12 June.

1. StudyCorgi. "Wi-Fi and Future Network Security." June 12, 2021. https://studycorgi.com/wi-fi-and-future-network-security/.


Bibliography


StudyCorgi. "Wi-Fi and Future Network Security." June 12, 2021. https://studycorgi.com/wi-fi-and-future-network-security/.

References

StudyCorgi. 2021. "Wi-Fi and Future Network Security." June 12, 2021. https://studycorgi.com/wi-fi-and-future-network-security/.

This paper, “Wi-Fi and Future Network Security”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.