Wireless Computing and Security

 Have you joined the wireless world?  Many people think of wireless
technology as applying only to computers.  If you have a cordless
phone, a garage door opener, GPS in your car, a satellite hookup for
your TV, or a cell phone, then you have been using wireless technology
as long as you’ve been using those items.  Surprised?  Many people are
when they realize they have been using a cordless phone or garage door
opener, for several years. 

In the computer world you have
Laptops/Notebooks,  PDAs (personal digital assistants), wireless
keyboards and mice and anything else that inter-connects without wires
or batteries, that is related to a computer.

The one thing most
people don’t realize is that using any of the above devices creates
it’s own security problems.  Anyone using a cordless phone should
realize that their phone calls can be intercepted.  Most people have no
reason to worry about whether someone is listening to their calls, but
there are occasions when the information discussed in a phone call is
so sensitive that they should not be using a Cordless phone or cell
phone to make the call.  Would you want a call to your bank
intercepted? or A call to your physician? or  A call to your lawyer? 
Businesses are more at risk than the average person because sensitive
information is often discussed by phone, but more businesses are becoming aware
of how insecure using wireless technology actually is.

If you use
wireless technology, you should be aware of the Security necessary to
keep your interactions over the device secure.  No matter what wireless
equipment you want to use, there is wireless technology available for
someone who wants to listen or steal the information you are sending
over that specific equipment. Now, the information sent by a garage
door opener isn’t particularly sensitive but people use phones,
laptops, PDAs, keyboards etc., to exchange sensitive information with
others that they don’t want to share with others. This is especially
true over the Internet.

If wireless computing is in your future, make sure you pay as much attention to Security for the device as you do to choosing and purchasing a laptop.  For different ways of making sure your wireless computing is secure, please read  Wireless Security – A Timely Topic,    Wireless – Why Do I Need Security?  and  Wireless Security – How To Protect Yourself
If a cell phone, cordless phone, wireless keyboard or mouse or any
other devices is in your future, then the some security information
about these devices is in   Wireless – Bluetooth Device Security.

 Securing and Protecting yourself and your information should be
at the top of your list, before using the wireless device you have
chosen. Sadly in this computer age, security and protection are
becoming absolutely necessary before we can enjoy our ‘electronic
toys’.  Identity Theft is one of the fastest growing evils of the 21st century. 

 

One thought on “Wireless Computing and Security”

  1. Bluetooth users are reasonably well covered by the 10m range (class 2) that most devices currently have. I think the real Bluetooth security risk will arise when more class 1, 100m devices turn up.

Leave a Reply

Your email address will not be published. Required fields are marked *


*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>