ACCESS provides managed wireless broadband services. We work with a variety of vendors to provide our customers with the best solution to match their needs.
If you are in need of a refreshed wireless infrastructure, please let us know so we can customize a solution that fits your needs.
Wireless - Best Practice Security Tips to Protect Your Assets
● Identify wireless coverage requirements
○ Determine the volume of use - students and teachers using tablets and laptops during learning.
○ Determine whether or not BYOD (bring your own device) will be your initiative and account for the volume of devices in addition to your school-owned devices.
○ Determine common areas and ensure you have sufficient coverage.
● Security - Protecting your local infrastructure
○ Plan for guest access - define policies on the types of devices you permit on your network as well as the time-frame guests can have access from within your building and around the perimeter.
○ Guest networks can be important in K-12 environments. It enables parents and visitors, as well as host-guest presenters to have filtered access to the Internet and other resources. It often makes sense to have separate networks for guests, presenters, staff and students, each with appropriate levels of access and security.
○ Turn off wireless networks to public/guest when not in use.
○ Enable wireless access points to scan, detect and contain “rogue” devices and alert the IT manager.
○ Detect and classify all wireless client devices in the environment and disable invalid clients.
○ Define a BYOD policy outlining devices which are “clean” when connected to your local infrastructure to protect your assets.
○ Insist on strong Wireless Lan security - threats come from insiders, such as students, as well as outside attackers. Develop WLAN policies that are role-based tied to user’s identity.
○ Ensure Internet filtering is present - remain CIPA compliant.
○ Anyone with a wireless-ready computer may attempt to use your network - neighbors, competitors, passers-by, or hackers lurking nearby. Unauthorized use of your network to commit a crime or send spam can be traced back to your location and you may be held liable.
○ Maintain appropriate firmware upgrades for your access points per manufacturer's recommendations.