The Rogue Risk: Find Suspicious Devices

In the office, a rogue access point usually begins innocently enough, but it is a liability that should be handled immediately. Processor details the risks and offers sound advice for dealing with unauthorized client devices.

The real danger of rogue APs comes when network access protection isn’t applied to LAN jacks at the desktop level, where rogues typically plug in. Methods such as 802.1X and encryption typically authenticate any connecting device, but many organizations omit such authentication so as not to hamper employees. This freedom is what allows people to tap into networks from the parking lot. Usually, they just want a quick way onto the Web, but sometimes they could be up to something more nefarious.

Read the Full Story at Processor

Latest Articles

Follow Us On Social Media

Explore More