Report – WiFi security from the perspective of Polish enterprises

March 27, 2019
/
Press release

Most organizations in Poland, although using wireless networks (WiFi), do not fully benefit from their potential – indicates the latest IDC report developed on behalf of Cisco and EXATEL.

For a dozen or so years, wireless networks have been a standard applied in business and are being increasingly more often used in public administration. However, the widespread use of this technology leads to these organizations not perceiving it as a tool that enables offering new, innovative services. There are also numerous, often unjustified, concerns about its security.

Meanwhile, as follows from the IDC report, WLAN infrastructure is one of the key foundation stones for the development of a new digital transformation strategy in business, public services and administration units. It not only enables the building of solutions based on the Internet of Things (IoT), but it also allows for the implementation of omnichannel sales models, contact with residents and regular access to unlimited SaaS services.

Wireless network solutions are successfully used in banking, as well as in the energy and transport sectors. In order to meet the habits of citizens halfway, public administration is also reaching out for them. Importantly, the technology providers themselves are getting a better understanding of the new game rules, so they have been introducing and promoting, e.g., tools for managing network cloud environment.

The study by IDC, Cisco and EXATEL showed that 2/3 of Polish organizations share their WiFi network with employees, guests or customers. In as many as 95.5% of the cases, the WiFi is intended for use by employees, and in 73.5% of the case it is made available to the given organization’s guests.

Wireless networks can be exploited in many various ways, often going beyond the stereotypical Internet access. The range of possibilities provided by WiFi is extensive; starting with smart buildings (where the possible scenarios are navigating inside buildings or asset management), to supporting customer service systems or residents. Interestingly, as many as 41% of all the IDC survey respondents believe that wireless solutions build positive image of the providing organization.

The first step in getting rid of cables is… security

WLAN wireless networks should constitute an indispensable element of the security policy in every organization. However, for the journey in the “wireless” direction to be smooth, companies must redefine the issue of IT security and place it at the top of the priority list. Security understood in a modern way, from a holistic perspective, is the foundation for each digital transformation strategy.

 

“It is important for cybersecurity to be the foundation for all activities associated with using wireless networks. Market practices and studies show that full monitoring of radio space will enable protecting a company from a cyberattack or other online threats. Meanwhile, only 48% of all CEOs, managers and specialists responsible for IT or network infrastructure who participated in the study, admitted that their organizations monitored the radio network of the organization. Unfortunately, this means that more than half (52%) of the companies do not implement such practices, despite the fact that it is, by far, the most effective and proactive method for detecting dangerous online events offered in Poland by contemporary WLAN solutions” – said Przemysław Kania, CEO at Cisco Poland.

 

Meanwhile the IDC, Cisco and EXATEL study shows that the main tool providing security in enterprises is the physical separation of a wireless network from the LAN (78.8%).

 

“The best practice in the field of cybersecurity is the limited trust principle – in terms of everything – whether this is a hardwired or wireless connection. Physical isolation is not just a good solution, but that of the ultimate. Yet, as an organization, we then limit the mobility of our employees. We tie them to work positions – and it is not necessary. A well-designed and protected wireless network can be treated on par with “the cable”. However, to do so one needs appropriate tools and knowledge in the form of network and traffic monitoring, VPNs or a relevant access configuration. Not every organization is able to achieve this individually. Owing to outsourcing, however, these skills can be acquired without much hassle” – said Jakub Syta, director of the Cybersecurity Department at EXATEL

 

Key data on the use of WiFi network security measures:

  • 87% of the respondents expected WiFi to be secure per se.
  • 79% of the study participants admitted that the WiFi in their organization was separated from an external network.
  • User access authentication or authorization was important to 79% of the surveyed.
  • Almost half (48%) pointed to the need for identifying and monitoring radio space threats.
  • 12% of the people who participated in the survey indicated other safeguards.

Key conclusions from the study on facilitating WLAN-based work:

  • Making work easier for the employees was important to 65% of the study participants.
  • 61% indicated facilitation for clients and guests.
  • 41% of the surveyed selected image-related benefits (e.g., Friendly State).
  • Reducing operating costs associated with frequent LAN reconstructions was important to 27% of the respondents.
  • 14% pointed to analytical functions.

Undoubtedly, secure wireless networks are equally as important as secure LANs – the more so as access to a wireless network will be the fundamental model of Internet use in the near future. The IDC study conducted in cooperation with Cisco and EXATEL shows that the market still requires further education and tangible implementation examples. Its evolution is accelerated by changing work models, increased mobility and new forms of access to business apps, etc. This is why inspiration among decision-makers in terms of creating new services for business, based on secure WiFi networks, and fully utilizing their potential is an important element.

The full version of the report is available here.

 

Autorzy: CERT EXATEL

 Published by: Piotr Mierzwiński