As wireless technology has gotten cheaper, it's become all but ubiquitous, both in professional and personal settings. With workers clamoring to use mobile devices like tablets and smartphones while on the job, the chances that these will be used as unauthorized and unsanctioned, or "rogue," access points also increases.
Wireless LANs prove difficult to manage even under the best of circumstances, so the added risks to network security and potential for robbing other bandwidth needed for legitimate uses must be curtailed. If your organization makes broad use of wireless network tech, or if IT plans to make the change soon, good policy decisions can go a long way towards minimizing resource problems and security vulnerabilities.
Download the Wireless Access Point Policy template from Info-Tech Research Group to establish clear, detailed procedures and practices for installing wireless access points throughout the business. This policy can serve as another tool in your arsenal to prevent unauthorized use or malicious attacks that can result in damage to critical applications, loss of information, damage to corporate reputation, revenue loss and bandwidth problems.