Sold on wireless but not the infrastructure

26.06.2006

"We use end-to-end VPN tunnelling, with WiFi Protected Access and a user authentication process on the wireless network, which asks for verification for access," he said.

"[Although wireless] security has improved markedly, a backup system must be in place [to prevent lost user data]; we use an automated system which now allows backup to occur external to the firewall."