Today Wi-Fi access is taken for granted. When your business partners come to your office for a meeting, they expect to be able to use the Internet on their own device. They would ask, “What’s your Wi-Fi password?” the same way they would ask, “Where’s your restroom?” Could you possibly not give them the password without sabotaging their impression of you and your business? Would you tell them they can’t use the restroom?
We know the risks associated with giving out your Wi-Fi password.
People who are able to connect to your network with Wi-Fi may be able to do the followings:
See shared files on your employee's computers and laptops
Plant and spread a virus
Slow down your Internet speed
Steal your employee identities and log-in credentials
Read emails getting sent out
Hack or attack others using your IP address, pretending it's you performing illegal activities. When the illegal network activities trace back to you, you will need to prove your innocence.
You may have trust in person using your Wi-Fi, but can you really trust the visitor’s device getting connected? Your visitor may unintentionally infect your network with a virus without his/her knowledge.
You have a few options if you want to offer Internet access to guests and visitors and limit their access to your primary internal network.
Make a separate guest network You don’t need to subscribe to another line from ISP to make a separate guest network. Today most routers and access pointers come with Guest Wi-Fi feature embedded. Check your router for the availability of this feature. Guest Wi-Fi feature on your router should be able to create a network domain completely separate from your local network. You can even create a Guest Wi-Fi without a password. After all, it’s easier for your visitors to connect to your public Guest Wi-Fi than to ask for your Wi-Fi password. This practice works if you have one or only a few routers in your small office. But what if you have multiple access pointers and routers in your network? What if there are so many of them that you don’t even know what IP address you have to enter to configure these routers? What if someone in your company connected a Wi-Fi router to the internal network that you are not aware of?
User authentication and role-based network access
The difficulty of identifying personal devices from employees and office visitors is precisely why we focused on building a network directory with captive portal service. What is needed is a centralized management system that sees and authenticates endpoints getting into your small network or networks no matter how they are connected. ThingsPage can be your core infrastructure to securely provide proper network access to both your internal users and visiting guests.
ThingsPage captive portal service works as follows:
A user connect to your wired or wireless network
The moment the user is connected, your customized captive portal webpage is displayed on the browser to select an access type: guest-access or member-access
Guests enjoy limited Internet access whereas members fully access your network after authentication.
ThingsPage is simplest and easiest cloud-based captive portal service for your BYOD office where employees and guests bring unmanaged devices to your office. With a simple captive portal, you will be able to visualize all connected endpoints and the people using them.
If you would like to learn more about how you can improve your user network experience, reduce administration and IT management overhead with simple captive portal service, contact us or install ThingsPage on your Windows now to try ThingsPage for free. No credit card required.