Securing the WLAN

Martin Courtney
clock

Martin Courtney asks how IT departments handle security and user access management on wireless networks

Mobile computing has truly come of age in the past couple of years. This is due in part to portable wireless devices combining internet access, email and mobile business applications with voice-cal...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security Technology

Saving face: Five key considerations when navigating the use of facial recognition technology

Saving face: Five key considerations when navigating the use of facial recognition technology

Facial recognition brings legal and reputational risks

Ashley Avery, Paolo Sbuttoni and Rachel Griffith
clock 03 September 2024 • 3 min read
SSO is dead: Why the age of zero trust demands secure explicit sign-on

SSO is dead: Why the age of zero trust demands secure explicit sign-on

Single sign-on's cons now outweigh the pros

Al Lakhani
clock 03 September 2024 • 5 min read
Microsoft mandates multi-factor authentication for Azure sign-in

Microsoft mandates multi-factor authentication for Azure sign-in

MFA requirement will be implemented in stages

clock 20 August 2024 • 3 min read