![]() Further, providing support for the disparate masses of personal devices would negatively impact our primary responsibility of supporting university equipment. Personal devices introduce considerable risk and support challenges. For a successful computing experience and to safeguard your credentials, university data, and the campus network, we encourage the regular and consistent use of university equipment for university work. We understand members of the university community use personally owned devices (cell phone, tablet, etc.) to perform occasional university-related work, such as checking email or providing credentials for Two-Step Login with Duo. Upon employment at the university, employees are typically provided university-owned equipment for their work. This document defines support provided by the ITS Extended Technical Support and Help Desk teams and provides more detail to the university-wide statement on use of personally owned equipment. While I haven't been able to go into a lot of detail, what has been discussed here should help you avoid having problems.To delineate IT support expectations for faculty, staff, and student employees who use personally owned computers and mobile devices for their regular work duties. If you or your network person are sure how to address some of what I have mentioned here, you should be able to reach someone in your local area that can help make this short work to get done. These are not one time steps but one that should be reviewed on a periodic basis to ensure that everything is OK and updated when the situation warrants. Just some basic steps that should be taken and you will help make your organization less of a target. The issues you bring up are all easily correctable. While wireless isn't a bad thing to have on networks since it can be cheaper to install than conventional wiring in some cases, not having it setup properly can leave you open for hacking and/or theft of data that can be thwarted with taking some steps such as enabling the highest level of encryption that your hardware can support such as AES and using a very strong encryption key such as those that are generated by Steve Gibson's Web site can make it hard enough for someone trying to break in to look for easier targets to go after. Worse yet, it probably isn't running any type of encryption, which exposes you to potential hacking attempts by drive by computers that won't even be in your building or on the property. Both of those should be changed to something that doesn't identify the organization name or purpose. In all likelihood, it probably is left a defaults in terms of SSID and admin password. Having one more system on the network that the firewall is licensed for can cause connectivity problems where one or more systems may stop accessing the internet on a sporadic basis.Ī wireless access point setup on the network that isn't authorized to be there presents several problems. Depending on the type of firewall you have connecting your network to the Internet, and please tell me that you are using one, some firewalls are licensed to handle a certain number of users. Depending on whether or not you have some type of server present, keeping computers not owned by the organization off of the network helps keep you in compliance with the licensing on the server. There are some potential licensing issues to be concerned about as well. With several articles being in the press lately about stolen laptops containing sensitive information, having a personal computer connecting to the network increases the possibility that data belonging to your organization could leave the building and end up in the hands of individuals that don't need to have access to the information. It helps minimize the possibility of spyware/viruses being introduced by computers that aren't protected to the same level that I am going to assume that the computers are on the network. One thing to consider is to put a policy in place that specifies that only computers owned by the nonprofit you work for are allowed to be on the network. There are issues on several fronts here that need to be addressed. You definitely have several things to be concerned about. I say this creates an unacceptable security problem. Our tech guy who is a part time employee has no objections. I recently found out that one of our employees installed Wi-Fi and uses his personal laptop to connect to the internet. Our network uses DSL to connect to the internet. I head the board of directors for a small nonprofit organization.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |