Wireless networks and laptops are very popular for their ease of use and portability. The Internet can be reached via radio waves without having to plug your machine into a network. It is with the same ease of connecting that malicious individuals connect to unprotected networks. Attackers conduct drive-by eavesdropping, called 'war driving' to listen in on unsecured devices in homes and businesses. Take the following steps to secure any wireless equipment. Consult your equipment's manual for specific details.
IT Security ensures that an organization's material and software resources are used only for their intended purposes. At ITD, security is a part of everything we do.