The Rogue Risk: Find Suspicious Devices

Unapproved devices can create a security hole that you need to fill.

By Enterprise Networking Planet Staff | Posted Jan 15, 2010
Print ArticleEmail Article
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn

In the office, a rogue access point usually begins innocently enough, but it is a liability that should be handled immediately. Processor details the risks and offers sound advice for dealing with unauthorized client devices.

The real danger of rogue APs comes when network access protection isn’t applied to LAN jacks at the desktop level, where rogues typically plug in. Methods such as 802.1X and encryption typically authenticate any connecting device, but many organizations omit such authentication so as not to hamper employees. This freedom is what allows people to tap into networks from the parking lot. Usually, they just want a quick way onto the Web, but sometimes they could be up to something more nefarious.

Read the Full Story at Processor

Comment and Contribute
(Maximum characters: 1200). You have
characters left.
Get the Latest Scoop with Enterprise Networking Planet Newsletter