Sound off: Why worry about wireless?

Wireless security threats are overhyped and easily stopped, says a Computerworld editor

Editor's note: Computerworld editors David Ramel and Preston Gralla disagree on the security threat posed by wireless networks. In this article, Ramel alleges that the threat is overhyped, that it's now trivial to secure wireless nets and that IT pros have far more serious security concerns they should be addressing -- while home users have little to lose even in the remote chance someone tries to breach their network.

In Why you need wireless protection, Gralla presents his case that wireless networks are indeed a serious vulnerability. He also provides tips on how to secure a wireless network. Both editors wrote their articles without having read the other's.

Want wireless security? Fine, click the WPA2 button during your router setup, enter a key, change the default log-on, and you're good.

Still worried? Fine, turn off SSID broadcast, and you're good.

If you're really paranoid, you can even filter MAC addresses so only the devices you specify can connect to your wireless network, and you're good. You're still done in under five minutes.

Meantime, you might want to think about whether or not Joe from Accounting is locking his car doors when traveling around with a laptop that contains tens of thousands of customer names, account information and Social Security numbers. Reading the news lately, I think you have bigger fish to fry than the relatively trivial matter of securing a wireless network.

Sure, Computerworld and other IT trade sites keep pumping out the wireless security tips, but wireless isn't new any more. It isn't a wild 'n' woolly frontier being explored by cutting-edge first-adopters ignorant of security issues and reluctant to jump through numerous hoops to be safe.

Everyone gets it now. These days, you have to want to be hacked if you're running an insecure wireless net. You practically have to beg for it.

Even home users get it. I used to drive around with NetStumbler and find all kinds of unsecured nets. No more. Even though they have very little to lose and the odds of losing it are slim, home users are securing their wireless operations like never before.

Shock and ignorance

I once asked on this site exactly how a wireless hacker could steal valuable information from a home wireless network, and no one had an answer. Readers were full of dire warnings and expressed all kinds of shock at my ignorance, but no one could provide details about how it's done.

Sure, someone could "steal" your bandwidth. But how many movies would they have to download before you even noticed a slowdown?

Sure, they could download child pornography using your Internet connection. But how many pedophiles are likely to be parked outside your house or live within range?

All these things could conceivably happen, but my point is that it's extremely unlikely anyone will even try -- and it's really easy to stop them if they do.

But if you're running a corporate network with valuable data to protect, you can't take any chances. Which is why vendors have made wireless security so simple.

At the time I'm writing this, I haven't yet read Preston Gralla's articles on why you need wireless protection and how to secure your wireless network, but I've read so many of these articles that I can reel off the likely top tips without doing any research at all: Change default log-in and password; change default SSID; enact WPA2; turn off "broadcast" mode of your device; and filter MAC addresses so only those devices specified can access your network. I've set up a few wireless devices, and each one explained pretty clearly how to secure the network. There's no excuse not to do it.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

David Ramel

Computerworld (US)
Show Comments

Cool Tech

D-Link PowerLine AV2 2000 Gigabit Network Kit

Learn more >

Crucial® BX200 SATA 2.5” 7mm (with 9.5mm adapter) Internal Solid State Drive

Learn more >

Xiro Drone Xplorer V -3 Axis Gimbal & 1080p Full HD 14MP Camera

Learn more >

ASUS ROG Swift PG279Q – Reign beyond virtual world

Learn more >

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

D-Link TAIPAN AC3200 Ultra Wi-Fi Modem Router (DSL-4320L)

Learn more >

Gadgets & Things

Lexar Professional 2000x SDHC™/SDXC™ UHS-II cards

Learn more >

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >


Learn more >

Family Friendly

ASUS VivoPC VM62 - Incredibly Powerful, Unbelievably Small

Learn more >

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Lexar Professional 2000x SDHC™/SDXC™ UHS-II cards

Learn more >

Stocking Stuffer

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Lexar Professional 2000x SDHC™/SDXC™ UHS-II cards

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Best Deals on Good Gear Guide

Latest News Articles


GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.


Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?