The Rogue Risk: Find Suspicious Devices
Unapproved devices can create a security hole that you need to fill.
In the office, a rogue access point usually begins innocently enough, but it is a liability that should be handled immediately. Processor details the risks and offers sound advice for dealing with unauthorized client devices.
The real danger of rogue APs comes when network access protection isnt applied to LAN jacks at the desktop level, where rogues typically plug in. Methods such as 802.1X and encryption typically authenticate any connecting device, but many organizations omit such authentication so as not to hamper employees. This freedom is what allows people to tap into networks from the parking lot. Usually, they just want a quick way onto the Web, but sometimes they could be up to something more nefarious.