Page 69 - Cyber Warnings
P. 69
2. Use Wi-Fi network segmentation to separate guest and private networks. Not only will
this boost performance, but also should a hacker breach the network, segmentation can
help keep the intrusion contained.
3. Use policies to segment IoT devices like web-cameras, thermostats, and others away
from guest and private networks.
4. Use a Unified Threat Management (UTM) appliance to secure the traffic as it traverses
each network segment.
5. If you’re not an expert in network management or security, hire a managed security
service provider (MSSP) to handle the burden.
Our future is dependent on the choices we, as consumers and security professionals, make
about our own security today. The reality is that vendors sell what the market buys. And, right
now, most people are content buying IoT devices that lack proper security. Either the market
demands better security or hackers continue to exploit vulnerabilities in IoT, costing the industry
dearly.
As a company, take the necessary steps to deliver secure Wi-Fi for your customers and
employees. As IoT continues to grow, having secure Wi-Fi will be vital to keeping them safe.
And, as a consumer, take a stand. Tell IoT manufacturers that you want better security. If we
don’t take our own security seriously, then neither will they.
About The Author
Ryan Orsi is Director of Product Management at WatchGuard, a global
leader in network security, providing products and services to more than
75,000 customers worldwide. Ryan leads the Secure Wi-Fi solutions for
WatchGuard. He has experience bringing disruptive wireless products to
the WLAN, IoT, medical, and consumer wearable markets. As VP Business
Development in the RF industry, he led sales and business development
teams worldwide to success in direct and channel environments. He holds
MBA and Electrical Engineering Degrees and is a named inventor on 19
patents and applications.
Ryan can be reached online at @RyanOrsi and at our company website
www.watchguard.com/wifi
69 Cyber Warnings E-Magazine – June 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide