Managing Access To Your Computer Network

by | Jan 15, 2014 | Computers and Internet

Technology moves so fast these days that many of us have trouble keeping up with it and we have a tendency to become stuck in methods and thinking that were “state of the art” when we first started to do something. This is especially true for those of us who regularly use computers but only have a vague idea about how they actually perform the tasks we give them to do.


Out of the box computers nearly always demand you set up an access password before you can startup the computer. Most users do this simply to stop someone else “getting in”. This is fairly good protection when looking at a standalone computer without any connection to any other computer let alone the internet. But, how many of those are around today?

Even households now have more than one computer and, like business operations, it is natural to want to connect those computers together – initially by wired cables but, increasingly, by wireless connections. Additionally, most, if not all, of these connected computers will have a means of connecting with the internet and, in many cases, that internet connection will also be wireless. Does everyone bother to password protect all of these connections?

Wireless Connectivity

We have our domestic and corporate computer networks and everybody that we allow to use them knows the correct passwords which, along with our anti-virus and firewall software leads us to believe we are totally safe. But, technology has got ahead of us yet again – this time through the internet and the proliferation of devices that connect to it through wifi. I hear they are now testing wifi spectacles and I have seen internet connected wrist watches plus, of course, all the different types of smart phones and tablets, etc.

Small And Not Immediately Visible

With all these devices at large, do you know whenever one of them is brought within connection distance of your computers – with or without your permission? There is even a new bit of jargon to cover this – BYOD or “bring your own device”. Once you realize that any one of these devices can access your network (even if only to “steal” your bandwidth); that is when you need to look into BYOD Device Management.

With BYOD device management system, you can, at least know how many devices are operating nearby and who is actively intruding on your network. Strategically positioned sensors will pick up the devices and allow you to monitor activity and then take any necessary action.


Recent Articles



Similar Posts