Networking & Communication
How is AI changing the threat landscape? AI is fuelling rapidly evolving cyber threats by making attacks more sophisticated, advanced and adaptive than ever before. One way the threat landscape is changing is in the emergence of deep fakes. Tis technology allows the creation of artificial images or videos that are used to impersonate individuals or places for amusement purposes. Although seemingly innocent, deepfakes can easily be leveraged as part of a misinformation campaign to extort organisations; for example, impersonating a senior employee and then instructing an employee to transfer funds. AI has also given rise to new cyber tools, such as AI phishing, that
can adapt in real time to avoid detection. Tis new variant of phishing uses generative AI agents and algorithms to generate realistic electronic conversations that may appear to be coming from an individual within the company. Combined with deepfake technology, this makes for potent cyber-threats that have the potential to cause severe damage.
How do security needs vary when it comes to different-sized organisations? Security requirements scale with organisational size, risk exposure and data sensitivity. SMEs typically have tighter budget constraints to work around and
smaller IT teams than larger organisations. While cost effectiveness is imperative for them, they should aim to implement more than just the bare security essentials - like investing in scalable network hardware such as enterprise-grade network switches and access points that can scale as their requirements grow without the need for replacement. SMEs should also look for firewall protection and a VPN included. Remember too that smaller companies rarely have dedicated IT
support teams, so recovering from a hack can be much harder for them. Larger enterprises typically require a more advanced setup to meet their security requirements as they process greater data volumes, confidential customer information and have more users to support. A larger enterprise should implement zero-trust architectures, VLANs for department segregation, and comprehensive monitoring to handle scale and mandates like GDPR.
What more can manufacturers, the channel, and end-users do to protect themselves? Security is everyone’s responsibility. Manufacturers like D-Link focus on building in strong protection from the get-go, such as WPA3 encryption on routers, regular firmware updates, and features like guest networks to isolate visitors. We also believe in educating the channel about our products. To do this, we host regular training programmes for channel partners on Wi-Fi security, VLAN segregation, and policy setup. Te channel can help amplify this by advising end users on best practices and offering managed services. At the end of the chain, end users can protect themselves by changing default passwords, enabling 2FA, scanning networks for unauthorised devices, avoiding suspicious links, and educating staff on phishing and ransomware risks. D-Link also provides guides and blogs to make it easier for customers to follow security best practices. What practices can network managers adopt to keep IoT networks secure? IoT has become a vital tool that is intrinsically linked to modern life, whether it’s for monitoring stock on shelves in supermarkets or
www.pcr-online.biz
automating supply lines for the manufacture of essential foodstuffs and consumer goods. With this in mind, it is vital to keep IoT networks secure. To do so, a practice network managers can adopt is to prioritise centralised management tools, which enable remote oversight of devices, facilitating one-click firmware updates across fleets to patch vulnerabilities quickly. Operational downtime can be minimised with such tools by scheduling IoT devices to be updated out of hours. Network managers can also implement VLAN segmentation to enhance security further; this separates any IOT traffic from the leading corporate network, reducing the risk of creating a security backdoor. Finally, the physical security of the router and modem is crucial; they should be enclosed in a secure case to keep them from being tampered with.
How has the rise of hybrid working increased the security risk factor for organisations? Hybrid work has increased security risks by decentralising access and allowing connections beyond the safety of a contained corporate environment. Employees who are connected through either home or public Wi-Fi may accidentally expose sensitive data through unsecured connections, lost devices, or weak endpoints. Businesses are able to mitigate these risks by enforcing a strict VPN policy for employees who are hybrid and issuing them a travel router. A good travel router will provide a secure connection when they’re working remotely from public locations like airports or cafes. Businesses should also activate two-factor authentication on all user accounts and make use of device encryption along with authenticator apps when using data-sensitive applications.
How oſten should organisations reassess their network security measures? In the age of AI, technology, and the threat landscape are constantly evolving, so businesses mustn’t become flat-footed when auditing their security hardware. Smaller organisations should be especially alert to this, as limited IT support and a lack of specialist knowledge can lead to outdated or insecure hardware. Ideally, businesses should review their security measures at least annually. To stay vigilant, organisations should regularly update firmware, phase
out legacy technologies (such as WPA2 Wi-Fi or Windows XP), and secure all endpoints, including phones and operating systems. Network managers should ensure operating systems are upgraded to the latest versions with current security patches, as legacy systems remain easy targets for bad actors. Implementing a holistic network audit procedure covering everything from routers to mobile phone systems can help ensure both compliance and resilience.
Is it possible to align security’s energy demands with sustainability initiatives? Network security is an essential requirement for businesses, ensuring that employee, customer, and supplier data remains secure. Equally important is that network hardware operates efficiently, as it must remain online 24/7. Modern technologies offer several ways to reduce energy consumption without compromising performance. For example, Wi-Fi 6 features like Target Wake Time put idle devices to sleep, lowering power usage. Switches with auto-port shutdown power off unused ports, while PoE switches optimise energy delivery to connected devices. D-Link also incorporates recyclable materials in its products and aims for 80% of revenue to come from green products by 2026.
November/December 2025 | 33
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52