{"id":2023,"date":"2003-11-26T00:00:00","date_gmt":"2003-11-26T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/26\/firms-wep-up-security-nightmare\/"},"modified":"2021-12-30T11:40:29","modified_gmt":"2021-12-30T11:40:29","slug":"firms-wep-up-security-nightmare","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/26\/firms-wep-up-security-nightmare\/","title":{"rendered":"Firms Wep up security nightmare"},"content":{"rendered":"<p>Basic wireless encryption standards have lulled UK firms into a false sense of security, with many relying on the Wireless Encryption Privacy (Wep) standard, according to a survey commissioned by SonicWall.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The research found 28 per cent of firms have implemented wireless infrastructures, while 40 per cent plan to do so by 2005, using Wep as the security standard rather than technologies such as virtual private networks.<\/p>\n<p>&#8220;Security is still a concern, but the biggest danger isn&#8217;t enterprise deployment but deployment by an end-user,&#8221; he said.<\/p>\n<p>Mike Smart, European product manager at SonicWall, said: &#8220;Relying on Wep or banning wireless usage is not enough to guarantee network integrity.&#8221;<\/p>\n<p>More info: [url=http:\/\/www.vnunet.com\/News\/1150021]http:\/\/www.vnunet.com\/News\/1150021[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2023","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2023"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2023\/revisions"}],"predecessor-version":[{"id":4510,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2023\/revisions\/4510"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}