Mobility in Computing: Networking Strategies for Small to Medium-Sized Businesses

Mobility in computing is becoming a primary driving factor for businesses, especially following the Covid-19 pandemic. When the pandemic hit, many businesses were not ready to send their workers home and did not have the networking infrastructure in place to support secure remote access to business resources. The move to support remote access not only hit businesses but also major internet and cellular providers who were also not set up to handle the massive changes in demand for service. Consider a small to medium sized business (SMB) of your choosing. In a 4-5 page APA-formatted paper, address the following:

Where should the business focus its networking hardware configuration: physical wiring or wireless?
Which telecommunications and/or networking components should the business acquire and implement to provide secure access to business resources and information?
Which security challenges does the company face in supporting remote access for employees?
Support your reasoning and recommendations with outside resources using proper citations and references.

Mobility in Computing: Networking Strategies for Small to Medium-Sized Businesses Introduction The Covid-19 pandemic has fundamentally altered the way businesses operate, highlighting the importance of mobility in computing. Small to medium-sized businesses (SMBs) are particularly impacted, as they often lack the necessary infrastructure to support secure remote access to business resources. This paper focuses on a hypothetical SMB, XYZ Corp., which operates in the consulting sector. It will explore the optimal networking hardware configuration, telecommunications components for secure access, and the security challenges associated with remote work. Networking Hardware Configuration: Physical Wiring vs. Wireless Focus on Wireless Networking For XYZ Corp., the emphasis should be on wireless networking infrastructure. While physical wiring can provide reliability and speed, the flexibility and scalability offered by wireless networks make them more suitable for an SMB environment. Employees are likely to work from various locations, including home offices and co-working spaces, making a robust wireless network essential. 1. Scalability: Wireless networks can easily accommodate new devices without the need for additional cabling. 2. Flexibility: Employees can connect from anywhere within the coverage area, promoting mobility and productivity. 3. Cost-Effectiveness: Initial installation costs for wireless networks are generally lower than extensive wiring systems, especially for businesses that may need to adjust their layout frequently. Recommendations for Wired Infrastructure While wireless should be prioritized, a hybrid approach that includes some physical wiring can enhance performance. Critical devices such as servers and network switches should be connected via Ethernet cables to ensure stable and fast connections. This hybrid model allows for a reliable backbone while providing flexibility for user devices. Telecommunications and Networking Components To facilitate secure access to business resources and information, XYZ Corp. should invest in the following telecommunications and networking components: 1. Wireless Access Points (WAPs) - Description: WAPs extend the wireless network coverage, allowing multiple users to connect simultaneously. - Recommendation: Deploy enterprise-grade WAPs that support Wi-Fi 6 technology, offering faster speeds and improved capacity for high-density environments (Cisco, 2021). 2. Virtual Private Network (VPN) - Description: A VPN creates a secure tunnel for remote employees to access corporate resources. - Recommendation: Implement a reputable VPN service that uses strong encryption protocols like OpenVPN or IKEv2 (NordVPN, 2023). This ensures that data transmitted over public networks remains secure. 3. Firewall - Description: Firewalls protect the internal network from unauthorized access and threats. - Recommendation: Invest in a next-generation firewall (NGFW) that includes intrusion detection and prevention systems (IDPS) to monitor traffic patterns and block suspicious activity (Palo Alto Networks, 2023). 4. Network Monitoring Tools - Description: Tools that keep track of network performance and security. - Recommendation: Utilize solutions such as SolarWinds or PRTG Network Monitor to identify vulnerabilities and ensure optimal performance. 5. Endpoint Security Solutions - Description: Software that protects individual devices from security threats. - Recommendation: Implement endpoint protection platforms (EPP) that include antivirus, anti-malware, and data encryption capabilities to safeguard employee devices (McAfee, 2023). Security Challenges in Supporting Remote Access Supporting remote access introduces several security challenges that XYZ Corp. must address: 1. Increased Attack Surface Remote work expands the attack surface as employees access company resources from various locations and devices. Each endpoint represents a potential vulnerability. 2. Unsecured Networks Employees may connect to public Wi-Fi networks at cafes or libraries, exposing sensitive information to eavesdropping attacks. 3. Phishing Attacks With remote work, employees may be more susceptible to phishing attempts, particularly through email. Cybercriminals often exploit remote work scenarios to target unsuspecting users (Verizon, 2023). 4. Device Management Managing a diverse range of employee devices poses challenges in maintaining consistent security policies across all endpoints. Recommendations for Mitigating Security Challenges To counter these challenges, XYZ Corp. should implement the following strategies: 1. Employee Training: Conduct regular training sessions on recognizing phishing attempts and safe internet practices to empower employees against social engineering attacks. 2. Mandatory VPN Usage: Enforce the use of VPNs whenever employees access company resources remotely to ensure secure connections. 3. Device Management Policies: Establish clear policies regarding acceptable devices for remote work, ensuring that only company-approved devices with updated security software can access corporate networks. 4. Multi-Factor Authentication (MFA): Implement MFA for all remote access points to add an additional layer of security beyond passwords. Conclusion As mobility in computing becomes increasingly vital for SMBs like XYZ Corp., it is essential to prioritize wireless networking while integrating necessary wired infrastructure. By investing in telecommunications components such as WAPs, VPN services, firewalls, and endpoint security solutions, XYZ Corp. can create a secure environment for remote workers. Addressing security challenges through robust training programs and strict policies will further enhance the organization’s resilience against cyber threats. References 1. Cisco. (2021). Why Wi-Fi 6 is Key to Your Network’s Evolution. Retrieved from https://www.cisco.com/c/en/us/solutions/small-business/wi-fi-6.html 2. McAfee. (2023). What is Endpoint Security?. Retrieved from https://www.mcafee.com/en-us/security-awareness/what-is-endpoint-security.html 3. NordVPN. (2023). What is a VPN?. Retrieved from https://nordvpn.com/what-is-a-vpn/ 4. Palo Alto Networks. (2023). What is a Next-Generation Firewall?. Retrieved from https://www.paloaltonetworks.com/cyberpedia/what-is-next-generation-firewall 5. Verizon. (2023). 2023 Data Breach Investigations Report. Retrieved from https://enterprise.verizon.com/resources/reports/dbir/ This paper outlines a strategic approach for XYZ Corp. to enhance its networking capabilities while addressing the unique challenges presented by remote work environments post-Covid-19.  

Sample Answer