{"id":114562,"date":"2006-04-24T19:18:00","date_gmt":"2006-04-24T23:18:00","guid":{"rendered":"https:\/\/www.send2press.com\/wire\/westchester-county-passes-wireless-network-security-law\/"},"modified":"2006-04-24T19:18:00","modified_gmt":"2006-04-24T23:18:00","slug":"westchester-county-passes-wireless-network-security-law","status":"publish","type":"post","link":"https:\/\/www.send2press.com\/wire\/westchester-county-passes-wireless-network-security-law\/","title":{"rendered":"Westchester County Passes Wireless Network Security Law"},"content":{"rendered":"<p class=\"s2pred\"><strong>NEWS SOURCE: Desktop Guerrillas<\/strong><\/p>\n<p><u>ARCHIVAL CONTENT<\/u><\/p>\n<p> STAMFORD, Conn., April 24 (SEND2PRESS NEWSWIRE) &#8212; Desktop Guerrillas offers businesses expert advice for securing their networks. Identity theft is one of the fastest growing crimes in this country. Criminals are enticed with a precious bounty &#8211; your credit line. We&#8217;ve all gotten used to shredding our credit card statements, but what about the businesses that are cavalier with our personal information?<\/p>\n<p> On April 20, Westchester County enacted a law requiring any business that uses a customer&#8217;s financial information to take &#8220;minimum security measures&#8221; to protect their wireless network. Businesses have 180 days to comply with the new law.<\/p>\n<p> Joe Presto, president of the technology consulting firm Desktop Guerrillas, agrees that enabling security features on a business&#8217;s wireless network is a must. However, care must be taken to ensure against improper setup by inexperienced technicians or users. &#8220;Not all encryption methods are created equal,&#8221; says Presto. &#8220;The most common type &#8211; called &#8216;WEP&#8217; &#8211; is far from secure, yet that&#8217;s what most businesses are relying on to protect their network. A skilled computer user can breach it in minutes.&#8221;<\/p>\n<p> To properly secure your business, Presto recommends following at a minimum:<\/p>\n<p> \t* Use WPA instead of WEP. Upgrade any wireless devices that aren&#8217;t WPA-compatible, as you cannot mix the two technologies.<\/p>\n<p> \t* Choose a strong encryption key. If words are used as part of the key, hackers may be able to guess at your key through a &#8220;dictionary attack.&#8221; Use a completely random set of letters, numbers, and symbols.<\/p>\n<p> \t* Don&#8217;t give your wireless network a name that would identify your company. Use a unique but non-identifiable name such as &#8220;wire3811.&#8221;<\/p>\n<p> A newsletter which covers wireless security in more detail is available online at www.desktopguerrillas.com. Desktop Guerrillas is also available for on-site evaluations of wireless networks.<\/p>\n<p>News issued by: Desktop Guerrillas<\/p>\n<p> # # # <\/p>\n<p><small>Original Story ID:  (1571) :: 2006-04-0424-002<\/small><\/p>\n<p><small>Original Keywords: Desktop Guerrillas, Joe Presto, protect their wireless network, WEP encryption, use WPA instead of WEP, newsletter, consulting, New York, New Jersey, Connecticut Desktop Guerrillas   <\/small><\/p>\n<p class=\"s2pred\"><strong>NEWS SOURCE: Desktop Guerrillas<\/strong> | Published: 2006-04-24 19:18:00<\/p>\n","protected":false},"excerpt":{"rendered":"<p>STAMFORD, Conn. (SEND2PRESS NEWSWIRE) &#8212; Desktop Guerrillas offers businesses expert advice for securing their networks. Identity theft is one of the fastest growing crimes in this country. Criminals are enticed with a precious bounty &#8211; your credit line. We&#8217;ve all gotten used to shredding our credit card statements, but what about the businesses that are cavalier with our personal information?<\/p>\n","protected":false},"author":9780,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"singles-wide.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19937],"tags":[],"class_list":["post-114562","post","type-post","status-publish","format-standard","hentry","category-press-releases-archive","has-post-title","has-post-date","no-post-category","no-post-tag","no-post-comment","has-post-author"],"acf":[],"views":424,"_links":{"self":[{"href":"https:\/\/www.send2press.com\/wire\/wp-json\/wp\/v2\/posts\/114562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.send2press.com\/wire\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.send2press.com\/wire\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.send2press.com\/wire\/wp-json\/wp\/v2\/users\/9780"}],"replies":[{"embeddable":true,"href":"https:\/\/www.send2press.com\/wire\/wp-json\/wp\/v2\/comments?post=114562"}],"version-history":[{"count":0,"href":"https:\/\/www.send2press.com\/wire\/wp-json\/wp\/v2\/posts\/114562\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.send2press.com\/wire\/wp-json\/wp\/v2\/media?parent=114562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.send2press.com\/wire\/wp-json\/wp\/v2\/categories?post=114562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.send2press.com\/wire\/wp-json\/wp\/v2\/tags?post=114562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}