Thursday, November 30, 2006

Overcoming Small Business Networks Sales Objections

Do you need help overcoming sales objections?



Do you sell computer networks, or other IT-related products and services to small businesses?



This article provides tips and hints so you can be overcoming the most common sales objections heard when selling networks to small business prospects, customers, and clients.



The problem generally begins when you start talking about a network upgrade. Around the time, many small business prospects, customers and clients will dwell on cost.



These small business prospects, customers and clients often neglect to consider the soft costs of not properly investing in a network… such as lost employee productivity when imprudent corners are cut, downtime when fault-tolerance is an afterthought, and service costs from computer consultants when difficult-to-support or "dead-end" solutions are selected primarily because of their low price tag.



No matter how thorough your initial consultation, IT audit, site survey and network design reports, some unforeseen client objections may pop up just before you get the client's authorization to proceed (generally a signed contract and retainer or deposit check).



Why Overcoming Sales Objections is SO Crucial



Because one relatively minor concern might threaten to derail the entire sale, you need to gain the critical business development skills for overcoming sales objections, with some of the biggest small business network deal-closing obstacles.



Empowered with these strategies for overcoming sales objections, you'll be much less apt to get emotional, defensive or just plain annoyed. You can then stay focused on keeping your eye on the ball and figuring out the best way to solve the prospect's or future client's problems …and of course, close the sale. Remember, your company isn't in business to solve prospects' problems; only those of paying clients.



Overcoming Sales Objections: Apathy



I hope you get a good night's sleep before this sales objection rears its ugly head. You need a powerful force to overcome apathy.



If small business decision-makers have an apathetic outlook toward the prospect of implementing a network, your decision-makers might take weeks, months, or perhaps even years before feeling a sense of urgency about your proposed network project.



However, once you discover the roots of this apathy, you'll be better able to push (or at least nudge) the approval process along.



Here's a typical example you'll find in the field: The small business owner sees no problem with their existing peer-to-peer network. One or two seemingly innocuous foul-ups, however, can cause the small business owner to see the "light".



With a Microsoft Windows peer-to-peer network, for example, the "server" seems perfectly reliable until the person working on the PC functioning as the server inadvertently hits the reset button with his or her knee.



If you need to be overcoming more of the common sales objections, you must be very adept and recounting these kinds of cautionary tales with the right timing, delivery and empathy.



Using Network Reliability to Overcoming Sales Objections



PC/LAN network reliability can also get called into question when the user of the peer-to-peer server inadvertently performs an unannounced, unscheduled shutdown and restart because a software setup program prompted a reboot.



With peer-to-peer networks, protecting data is usually also an afterthought. If the peer-to-peer server isn't protected with fault tolerant hard drives, a reliable tape backup drive, a server-class UPS, and updated antivirus software, a peer-to-peer server becomes an accident waiting to happen.



So while any of these factors can turn apathy into your opportunity, sometimes a little divine intervention steps in to help you in overcoming sales objections.



One day a lightning storm and blackout pushes your client's "server" over the edge. When power's restored, the server cannot even boot up to its welcome or logon screen. So now, the small business owner is scrambling with the internal guru at 2 a.m. trying to restore the company's corrupted contact management database, which contains 25,000 records and three years of data.

Tuesday, November 28, 2006

Cabling your home for computer network - still a requirement?

With proliferation of wireless networking and communication equipment it is oh-so-tempting to cut the cord and save a significant sum of money in the process. But is everything that a regular computer networking user needs can be done using just wireless network? Let’s take a look at some pros and contras:



1. One important advantage of having a cabled network is the available bandwidth or simply speed. At the present point in time the speed of connection via a simple and inexpensive CAT5E cable can be 1000Mbit/sec, whereas the best that IEEE802.11g (one of the many flavors of Wi-Fi) can offer is only 54Mbit/sec. It may not seem so significant if you think you are only browsing Internet, and the DSL speed available to you is 1.5Mbit/sec. However, if you need to print via your network connection on a remote printer, you should realize that the print jobs, depending on the amount of graphic data in them, can easily reach dozens and even hundreds megabytes. Since 1Byte=8bit one 100MByte print job will take 15 seconds (and in reality this time can be much longer) to transmit via a Wi-Fi wireless connection, and this time shrinks to mere 1 sec or less on wired 1000MBit/s Ethernet connection. Same principal applies to transferring files, backing up files on other computers in the network etc.

2. It is not possible today and with all probability will not be possible in the future to transmit power needed for your networking device via the wireless link. Unless, of course, you would be willing to be subjected to very high levels of microwave radiation. Thus a device that was marketed to you as “un-tethered” will in fact be very much tethered via the power cord or will have to be re-charged every so often. The power requirements are increasingly important for devices that are expected to be always online, such as phone sets. Therefore it is best to have it connected via a cable that can deliver both power and the communication signal at the same time.

3. Wireless communications are very much proprietary and require whole gamut of conversion equipment to transmit multi-media signals. The same CAT5E cable can without any modification support phone, computer network, balanced line level audio signal, baseband video signal as well as host of other, more specialized, control applications’ signals. With inexpensive adapters called “baluns” the same cable can carry significant number of channels of broadband television or carry a baseband video, such as security camera output, through great distances. All of those applications, except the computer network of course, will require specialized expensive conversion equipment if they needed to be transmitted via a Wi-Fi link.

4. The cost benefit of not running wires around the house is not as simple as issue as it seems. Having installed a wireless network at home you have only eliminated the need to wire for a single application – computer network. A modern home, however, requires all kinds of wiring to run even without regard to computers. The power and phones are obvious examples, as well as thermostats and security systems. Pre-wired speakers are common and most homes today have intercom systems as a desirable option, and those also require extensive wiring. It is very likely that the same contractor running the intercom or security cables is qualified to run computer cables – CAT5E or better. If you are building a home, you should definitely check if computer cabling option is available in your new home, and our advice is to go ahead and purchase it before the walls close. It is going to be a pretty involved and expensive procedure to install the cables later. As an added cost benefit of a wired computer network you will find that all modern computers ship with wired Ethernet network interface card included, and the latest models ship with 1000MBit/sec cards that are essentially free for the computer’s owner.



There are multiple sources of information available on proper planning and design of a residential cabling for voice, data, audio, video and other applications. One of the best sources is the TIA/EIA-570B standard, most resent release of which has been published in 2004. The standard outlines recommended types of the cables, principals of cable distribution in a single- and multi-dwelling units as well as recommended amount of cables to be installed based on the size of the house.



In conclusion, cutting the wire seems like a step forward, some sort of liberation of computer from the bonds of the infrastructure. I would caution the reader, however, to take a more balanced and informed approach before joining the wireless revolution. There are still (and will remain in foreseen future) sound reasons to include properly designed cabling system into the list of your dream home options.



Cabling your home for computer network - still a requirement?



With proliferation of wireless networking and communication equipment it is oh-so-tempting to cut the cord and save a significant sum of money in the process. But is everything that a regular computer networking user needs can be done using just wireless network? Let’s take a look at some pros and contras:



1. One important advantage of having a cabled network is the available bandwidth or simply speed. At the present point in time the speed of connection via a simple and inexpensive CAT5E cable can be 1000Mbit/sec, whereas the best that IEEE802.11g (one of the many flavors of Wi-Fi) can offer is only 54Mbit/sec. It may not seem so significant if you think you are only browsing Internet, and the DSL speed available to you is 1.5Mbit/sec. However, if you need to print via your network connection on a remote printer, you should realize that the print jobs, depending on the amount of graphic data in them, can easily reach dozens and even hundreds megabytes. Since 1Byte=8bit one 100MByte print job will take 15 seconds (and in reality this time can be much longer) to transmit via a Wi-Fi wireless connection, and this time shrinks to mere 1 sec or less on wired 1000MBit/s Ethernet connection. Same principal applies to transferring files, backing up files on other computers in the network etc.

2. It is not possible today and with all probability will not be possible in the future to transmit power needed for your networking device via the wireless link. Unless, of course, you would be willing to be subjected to very high levels of microwave radiation. Thus a device that was marketed to you as “un-tethered” will in fact be very much tethered via the power cord or will have to be re-charged every so often. The power requirements are increasingly important for devices that are expected to be always online, such as phone sets. Therefore it is best to have it connected via a cable that can deliver both power and the communication signal at the same time.

3. Wireless communications are very much proprietary and require whole gamut of conversion equipment to transmit multi-media signals. The same CAT5E cable can without any modification support phone, computer network, balanced line level audio signal, baseband video signal as well as host of other, more specialized, control applications’ signals. With inexpensive adapters called “baluns” the same cable can carry significant number of channels of broadband television or carry a baseband video, such as security camera output, through great distances. All of those applications, except the computer network of course, will require specialized expensive conversion equipment if they needed to be transmitted via a Wi-Fi link.

4. The cost benefit of not running wires around the house is not as simple as issue as it seems. Having installed a wireless network at home you have only eliminated the need to wire for a single application – computer network. A modern home, however, requires all kinds of wiring to run even without regard to computers. The power and phones are obvious examples, as well as thermostats and security systems. Pre-wired speakers are common and most homes today have intercom systems as a desirable option, and those also require extensive wiring. It is very likely that the same contractor running the intercom or security cables is qualified to run computer cables – CAT5E or better. If you are building a home, you should definitely check if computer cabling option is available in your new home, and our advice is to go ahead and purchase it before the walls close. It is going to be a pretty involved and expensive procedure to install the cables later. As an added cost benefit of a wired computer network you will find that all modern computers ship with wired Ethernet network interface card included, and the latest models ship with 1000MBit/sec cards that are essentially free for the computer’s owner.

Sunday, November 26, 2006

Crime Fighting Computer Systems and Databases

As crime globalizes, so does crime fighting. Mobsters, serial killers, and terrorists cross state lines and borders effortlessly, making use of the latest advances in mass media, public transportation, telecommunications, and computer networks. The police - there are 16,000 law enforcement agencies in the Unites States alone - is never very far behind.



Quotes from the official Web pages of some of these databases:



National Center for the Analysis of Violent Crime (NCAVC)



Its mission is to combine investigative and operational support functions, research, and training in order to provide assistance, without charge, to federal, state, local, and foreign law enforcement agencies investigating unusual or repetitive violent crimes. The NCAVC also provides support through expertise and consultation in non-violent matters such as national security, corruption, and white-collar crime investigations.



It comprises the Behavioral Analysis Unit (BAU), Child Abduction and Serial Murder Investigative Resources Center (CASMIRC), and Violent Criminal Apprehension Program (VICAP).



VICAP is a nationwide data information center designed to collect, collate, and analyze crimes of violence - specifically murder. It collates and analyzes the significant characteristics of all murders, and other violent offenses.



Homicide Investigation Tracking System (HITS)



A program within the Washington state's Attorney General's Office that tracks and investigates homicides and rapes.



Violent Crime Linkage System (ViCLAS)



Canada-wide computer system that assists specially trained investigators to identify serial crimes and criminals by focusing on the linkages that exist among crimes by the same offender. This system was developed by the RCMP (Royal Canadian Mounted Police) in the early 1990s.



UTAP, stands for The Utah Criminal Tracking and Analysis Project



Gathers experts from forensic science, crime scene analysis, psychiatry and other fields to screen unsolved cases for local law enforcement agencies.



International Criminal Police Organization (ICPO) - Interpol's DNA Gateway



Provides for the transfer of profile data between two or more countries and for the comparison of profiles that conform to Interpol standards in a centralized database. Investigators can access the database via their Interpol National Central Bureau (NCB) using Interpol's secure global police communications system, I-24/7.



Interpol's I-24/7



Global communication system to connect its member countries and provide them with user-friendly access to police information. Using this system, Interpol National Central Bureaus (NCBs) can search and cross-check data in a matter of seconds, with direct and immediate access to databases containing critical information (ASF Nominal database of international criminals, electronic notices, stolen motor vehicles, stolen/lost/counterfeit travel and ID documents, stolen works of art, payment cards, fingerprints and photographs, a terrorism watch list, a DNA database, disaster victim identification, international weapons tracking and trafficking in human beings-related information, etc).



Interpol Fingerprints



Provides information on the development and implementation of fingerprinting systems for the general public and international law enforcement entities.



Europol (European Union's criminal intelligence agency) Computer System (TECS)



Member States can directly input data into the information system in compliance with their national procedures, and Europol can directly input data supplied by non EU Member States and third bodies. Also provides analyses and indexing services.



As crime globalizes, so does crime fighting. Mobsters, serial killers, and terrorists cross state lines and borders effortlessly, making use of the latest advances in mass media, public transportation, telecommunications, and computer networks. The police - there are 16,000 law enforcement agencies in the Unites States alone - is never very far behind.



Quotes from the official Web pages of some of these databases:



National Center for the Analysis of Violent Crime (NCAVC)



Its mission is to combine investigative and operational support functions, research, and training in order to provide assistance, without charge, to federal, state, local, and foreign law enforcement agencies investigating unusual or repetitive violent crimes. The NCAVC also provides support through expertise and consultation in non-violent matters such as national security, corruption, and white-collar crime investigations.



It comprises the Behavioral Analysis Unit (BAU), Child Abduction and Serial Murder Investigative Resources Center (CASMIRC), and Violent Criminal Apprehension Program (VICAP).



VICAP is a nationwide data information center designed to collect, collate, and analyze crimes of violence - specifically murder. It collates and analyzes the significant characteristics of all murders, and other violent offenses.



Homicide Investigation Tracking System (HITS)



A program within the Washington state's Attorney General's Office that tracks and investigates homicides and rapes.



Violent Crime Linkage System (ViCLAS)



Canada-wide computer system that assists specially trained investigators to identify serial crimes and criminals by focusing on the linkages that exist among crimes by the same offender. This system was developed by the RCMP (Royal Canadian Mounted Police) in the early 1990s.



UTAP, stands for The Utah Criminal Tracking and Analysis Project



Gathers experts from forensic science, crime scene analysis, psychiatry and other fields to screen unsolved cases for local law enforcement agencies.

Sunday, November 19, 2006

Setting Up and Securing Your Wireless Network

There are more and more individuals opting to work from home than ever before. The advantages to this are many including avoiding the morning and evening rush hours, being able to spend time with your kids and significant other, and doing everything on your own time. Though the pitfalls are many, the one that I will be focusing on in this article is that of setting up a secure wireless network for your home based business. Right now somewhere out there, there is someone with a receiver waiting to pick up on an unsuspecting person’s wireless local area network. Their hope is to garner some sensitive information that may lead to identity theft, and stolen proprietary business information.



Most businesses owners are not technically inclined, though they may be power users, in general security settings is not one of the first things they want to mess around with in their day to day operations. This makes most wireless LANs a great target for information predators.



Here are some general guidelines to follow in setting up your wireless network. Though it may vary from vendor to vendor, the gist is more or less the same:



1. Setup the wireless access/router point via a wired client.

2. Always change the factory setting password to something difficult for someone to guess.

3. Enable 128-bit Wired Equivalency Privacy (WEP) encryption on both your access point and network card. From time to time change the WEP key entries. If your hardware does not support a minimal of 128 bit WEP encryption, then it may be time to replace this dinosaur. WEP is only a minimal security precaution, which is better than none at all.

4. Alter the factory default SSID on the access/router point to a convoluted difficult to guess string. Initiate your computer to connect to this configured SSID by default.

5. Setup your access point not to broadcast the SSID if available.

6. Block off anonymous internet requests and pings.

7. P2P Connections should be disabled.

8. Enable MAC filtering.

9. Enable firewall on the network router/access point with demilitarized zone function disabled. Enable client firewalls for each computer in the network.

10. Update router and access point firmware as updates become available.

11. Make sure the physical router is hidden so that a random person can’t reset the settings.

12. Position the physical router near the middle of the establishment as opposed to near windows to prevent others outside from receiving the signals.



These and other settings will collectively help prevent any unwanted intrusions on your private data.



There are more and more individuals opting to work from home than ever before. The advantages to this are many including avoiding the morning and evening rush hours, being able to spend time with your kids and significant other, and doing everything on your own time. Though the pitfalls are many, the one that I will be focusing on in this article is that of setting up a secure wireless network for your home based business. Right now somewhere out there, there is someone with a receiver waiting to pick up on an unsuspecting person’s wireless local area network. Their hope is to garner some sensitive information that may lead to identity theft, and stolen proprietary business information.



Most businesses owners are not technically inclined, though they may be power users, in general security settings is not one of the first things they want to mess around with in their day to day operations. This makes most wireless LANs a great target for information predators.



Here are some general guidelines to follow in setting up your wireless network. Though it may vary from vendor to vendor, the gist is more or less the same:



1. Setup the wireless access/router point via a wired client.

2. Always change the factory setting password to something difficult for someone to guess.

3. Enable 128-bit Wired Equivalency Privacy (WEP) encryption on both your access point and network card. From time to time change the WEP key entries. If your hardware does not support a minimal of 128 bit WEP encryption, then it may be time to replace this dinosaur. WEP is only a minimal security precaution, which is better than none at all.

4. Alter the factory default SSID on the access/router point to a convoluted difficult to guess string. Initiate your computer to connect to this configured SSID by default.

5. Setup your access point not to broadcast the SSID if available.

6. Block off anonymous internet requests and pings.

7. P2P Connections should be disabled.

8. Enable MAC filtering.

9. Enable firewall on the network router/access point with demilitarized zone function disabled. Enable client firewalls for each computer in the network.

10. Update router and access point firmware as updates become available.

11. Make sure the physical router is hidden so that a random person can’t reset the settings.

12. Position the physical router near the middle of the establishment as opposed to near windows to prevent others outside from receiving the signals.

Tuesday, November 14, 2006

Computer Consulting Profit Secrets

Do you own or manage a computer consulting company? Are you having trouble growing your computer consulting company's profits?



If so, then you must learn how to focus on your computer consulting firm's profit and bottom line.



In this article, we'll look at 7 profit secrets and strategies you can use in your computer consulting business, to ensure that you are able to balance your clients' small business IT needs against your own computer consulting company's profitability challenges.



Origins of the Problem



While focusing on your computer consulting profits may sound simple enough at first glance, this business-focused discipline often eludes many a computer consulting firm.



This usually happens because many computer consulting business owners fall in love the technology gadgetry, and get seduced by seemingly attractive reseller channel programs, at the expense of their business' profit.



At the end of the day however, your computer consulting company is a business… not a charity and not a hobby. And your computer consulting company must be run like a business.



Profit Secret #1: Show motivation with your small business computer consulting clients.

To avoid being labeled as just another clueless geek, you need to position your computer consulting services to be more in line with those of a virtual CIO for hire. So always be on the look out for new ways to enhance your clients' businesses… not just fix broken desktops and servers.



Profit Secret #2: Be dedicated to the task and relentless in your pursuit to improve the status quo.

Because it takes a lot of work to land the best computer consulting clients, you need to focus on lifetime customer value… not just one-shot-deal sales. So always remember that your proposed or recently implemented computer consulting technology solution isn't a one-shot deal. This kind of long-term vision and planning requires tremendous staying power and perseverance… which often escapes many computer consulting business owners.



Profit Secret #3: Don't be afraid to be creative with your client engagements.

Small business technology solutions often need to stay within relatively modest budgets. And your computer consulting solutions must work without the need for in-house IT staff. To satisfy these challenges, don't be afraid to think outside of the box when appropriate.



Profit Secret #4: Evaluate how your clients' systems, both paper- and computer-based, function today.

As part of your virtual CIO role, look at how these existing clients systems are meeting or not meeting present and future needs. Most of this work will be done during IT audits… another key computer consulting profit secret that can really help to separate you from the pack of mediocrity.



Profit Secret #5: Put yourself in your clients' shoes and think about what THEIR clients need from them.

Yes, as a computer consulting business owner, you need to have good people skills and a certain degree of empathy for your clients' business problems. But an even more advanced computer consulting business owner doesn't just stop at understanding their clients' business problems. The virtual CIO really digs in and learns about their clients' customers' business problems… one layer down on the value chain.



Profit Secret #6: Keep up with advances and new versions.

As virtual CIO for your computer consulting clients, your clients depend on your firm to advise them on what tools can better help their businesses grow. So while you can't allow this R&D and training to consume and devour all of your scarce weekly schedule, you do need to stay a few steps ahead of your clients' IT needs at all times.



Profit Secret #7: Summarize and share that information with your clients.

The essence of your R&D and training should focus on one major objective: will this new platform or tool add value to your computer consulting clients' existing or future installations? And how you can best summarize this information, in layperson language that non-technical clients can understand?



The Bottom Line

Your computer consulting firm's needs to be your client's virtual IT department can often be at odds with your computer consulting firm's need to be profitable. A big part of this problem happens because computer consulting business owners fall in love with technology, at the expense of their marketing and sales activities.

Tuesday, November 07, 2006

Six Largest Mistakes Made when Hiring a Cabling Contractor

Cabling of data and voice systems is often ignored by many companies until the last minute just before relocation or new building takes place. Many information systems professionals view it as a low priority or something that just takes away from their budget for real network components such as servers or software. However having a state of the art easy to manage cabling system is just as important as good reliable servers on a network. Cabling is the backbone of any computer network; it ties all the components of the network together therefore it should receive as much careful consideration as any other network component.



Mistake number one – Blindly choosing the lowest bidder



This is the most common mistake made when installing voice and data network cabling. Often the lowest bidder is the contractor who is the smallest, has the least experience or the one that made a mistake on their bid. Prior to making this decision you should know your contractor. Find out how long they have been in business, visit some of the large installations they have done and by all means go visit their offices and warehouse. A site visit to their office will tell you most of what you need to know about an organization. Make sure your contractor has completed jobs of similar scope and size.



Mistake number two – Choosing the manufactures product that will be installed



Many companies have tried to standardize on a particular manufacture of cabling system. Some of the larger manufactures are Belden, Comscope, Ortronics, AMP and Leviton. You can’t go wrong with any of these big names. However IT managers and corporate executives get hung up on trying to standardize because they believe it will make things easier for the IT staff. The reality of the situation is that if you choose any of the larger names the only components that might not be interchangeable are the faceplates. Of course there are performance criteria as well and they all claim to be the best. Do your own research and choose a manufacture that you feel has a strong company that will be there to stand behind their product should you even need to make a warranty claim



Mistake number three – Paying too much for the latest cabling technologies



The fact is that today’s network components and network components of the future cannot exceed the specifications of Cat 5E and Cat 6 cabling components. Combine this with the fact that the average company moves every 3 to 4 years. You will find it hard to benefit from future proofing a building you don’t occupy. Look at you current infrastructure, what equipment or applications do you plan to add or upgrade? Is Gigabit or 10 Gigabit Ethernet an option for you in the near future?



Mistake number four – Not using universal wiring



The EIA/TIA and BICSI both recommend a universal wiring platform for your Communications Infrastructure. In the old days the average install would consist of a single voice grade cable for the phone system and a single data grade cable (Cat 3, Cat5, Cat5E or Cat 6) for their computers. This of course dedicates the usability of these cables to one system type. This is further exacerbated by the termination method used. Voice cables were traditionally terminated on 66 style blocks (66m1-50), which are not user friendly and require a special tool and cross connect wire to make changes. Telephony companies have made a killing for years just performing MAC work (Moves, Adds and Changes) because a customer was unable or unwilling to brave the telephone closet and perform the MAC work themselves.



The practice of using a true universal wiring platform is now the standard for all reputable cabling contractors. A Universal Wiring Platform is made up of all data grade components that are downward compatible for all voice applications. A common installation would consist of 3 Category 5E or Category 6 cables all terminated on a 110 type Patch Panel. At the wall plate all cable would be terminated on the matching grade of 8 position modular jack (incorrectly know as an RJ-45). This design not only allows for maximum flexibility were the customer could have 3 computers or 3 phones or 2 computer and 1 phone or any configuration that works for their application. The point is that now the customer is in complete control of their cabling infrastructure and does not need to pay a contractor to come out every time they move an office. In the long run this will also save you money on the overall cabling system as it will shift and flex to meet your needs without having to bring in your cabling contractor. Remember, having the contractor in after construction has completed will involve them pulling out ceiling tiles and standing on desks while you are trying to do business. The elimination of the disruption alone makes it worth while.



Mistake number five – No CAD pre installation and post installation CAD drawings.



Most customers really have no idea what their cabling platform will look like when they sign the paperwork. They rely on their contractor to “just do the right thing”. Do not make this mistake, if you don’t understand how your infrastructure will work or what it should look like, don’t sign. Your contractor should have the ability to take your building blue print and overlay his cabling plan on top of your electrical plans. This will give you a visual representation of what you are paying for and allow you to ask questions. Likewise, after the job is complete you should receive what is called an “As Built Drawing” showing all of your communications outlets with a standards based numbering system. Some contractor will even provide a scale elevation plan showing were your patch panels are and how much room you have left in each rack for growth and or other equipment. This should be provided to you both hard copy and in AutoCAD format for your architect to incorporate into your final building As Builts.

Saturday, November 04, 2006

How To Secure Your Wireless Network

People have more flexible time due to wireless network. Thanks to the invention of wireless. People can now work from home while taking care of their kids or doing house works. No more stress from traffic jam anymore. Is this great?



Well, there is something you should realize. Working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. As WLANs send information over radio waves, someone with a receiver in your area could be picking up the transmission, thus gaining access to your computer. They could load viruses on to your laptop which could be transferred to the company's network when you go back to work.



Believe it or not! Up to 75 per cent of WLAN users do not have standard security features installed, while 20 per cent are left completely open as default configurations are not secured, but made for the users to have their network up and running ASAP. It is recommended that wireless router/access point setup be always done though a wired client.



You can setup your security by follow these steps:



1. Change default administrative password on wireless router/access point to a secured password.



2. Enable at least 128-bit WEP encryption on both card and access point. Change your WEP keys periodically. If equipment does not support at least 128-bit WEP encryption, consider replacing it. Although there are security issues with WEP, it represents minimum level of security, and it should be enabled.



3. Change the default SSID on your router/access point to a hard to guess name. Setup your computer device to connect to this SSID by default.



4. Setup router/access point not to broadcast the SSID. The same SSID needs to be setup on the client side manually. This feature may not be available on all equipment.



5. Block anonymous Internet requests or pings. On each computer having wireless network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.



Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses should be registered with the router /access point. Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.



All computers should have a properly configured personal firewall in addition to a hardware firewall. You should also update router/access point firmware when new versions become available. Locating router/access point away from strangers is also helpful so they cannot reset the router/access point to default settings. You can even try to locate router/access point in the middle of the building rather than near windows to limit signal coverage outside the building.



There is no guarantee of a full protection of your wireless network, but following these suggested tips can definitely lessen your risk of exposing to attackers aiming at insecure networks.



People have more flexible time due to wireless network. Thanks to the invention of wireless. People can now work from home while taking care of their kids or doing house works. No more stress from traffic jam anymore. Is this great?