Keeping Connected to Your Web Hosting Business - Security Concerns and Tools for the Future
(Page 4 of 4 )
Anyone familiar with wireless Internet access knows that there are certain security issues related to its use. Because it is wireless, other wireless equipment can tap into the signal; hackers can thus steal personal or confidential information, such as passwords, financial details, and so on. Wi-Fi users must employ some kind of protection to prevent this from happening, and make sure it is properly configured. Usually this involves some form of wireless encryption, and sometimes multiple layers of encryption.
Not surprisingly, there are companies that address this issue. “Long-range, secure wireless access points allow you to extend your wireless range…through a store or warehouse…while preventing access or leakage of data to war drivers…” explains Mary Hwang, product line manager for SonicWALL, a wireless security systems provider.
With wireless Internet access becoming ubiquitous, we can expect to see the blossoming of voice over Internet Protocol (VoIP), which allows users to hold conversations over the Internet as if they were talking on a telephone line. As the security for Wi-Fi improves, secure voice over Wi-Fi will attract more users.
In the meantime, you can expect to see many executives making creative use of the tools that are currently available. For example, some instant messaging systems allow multiple users to join in a group chat involving three or more people, a feature known as text conferencing. Executives can use this feature to manage a developing situation, such as a serious power outage or accident at the hosting site, and coordinate what needs to be done. Each person involved can keep everyone else informed of what they have accomplished regardless of whether they’re on the spot or working remotely from an Internet-enabled handheld device. After all, using technology to make the connections to enable people to get their jobs done is, in a sense, an important part of what web hosting itself is all about.
DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware. |