{"id":2395,"date":"2006-07-05T00:00:00","date_gmt":"2006-07-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/07\/05\/security-still-key-wlan-concern\/"},"modified":"2021-12-30T11:41:16","modified_gmt":"2021-12-30T11:41:16","slug":"security-still-key-wlan-concern","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/07\/05\/security-still-key-wlan-concern\/","title":{"rendered":"Security Still Key WLAN Concern"},"content":{"rendered":"<p>Research firm Gartner Inc. says the growth of wireless LAN networking the enterprise is causing users to worry more about WiFi security risks than ever before.   Gartner asked 200 networking and business technology firms in North America and Europe about their enterprise WLAN technology late last year.  Gartner says that security concerns are growing as WLAN networks become a standard part of the corporate landscape rather than being limited to conference rooms and branch offices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The pesky thing about WiFi security is that it also extends beyond the confines of the enterprise network, as Gartner notes.  &#8220;Managing wireless security also involves managing users and devices when they are connected from remote branch offices, hot spots, and home offices,&#8221; says analyst Rachna Ahlawat.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=98497&#038;WT.svl=news2_5<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2395","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2395"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2395\/revisions"}],"predecessor-version":[{"id":4882,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2395\/revisions\/4882"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}