An emerging use of wireless local area networks (LANs) is to carry voice traffic, letting companies extend phone service to mobile workers inside a building or campus without paying for cellular service. Hospitals have spearheaded adoption, with retailers and facilities managers also using it.But voice over wireless IP has a security drawback: Any authentication technology more powerful than the wired equivalency privacy (WEP) will cause delays of several seconds as users roam from one access point to another. However, WEP is easily hacked and is not considered appropriate for business, education or government deployments.Fortunately, there are several techniques to get around these limits. The simplest is to use virtual LANs (VLANs), which separate the voice and data traffic. In this case, the voice traffic’s VLAN would use WEP encryption, while the data traffic’s VLAN would use a better method such as IEEE 802.11i. That’s what the HP Pavilion sports arena in San Jose, Calif., did when it deployed a wireless LAN for its facilities and events staff, notes General Manager Jim Goddard.Another option would be to build a second wireless LAN using a different radio spectrum, again using WEP for the voice network and a better technology for the data network. This approach allows more network traffic, but it is more costly. Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe