Ad Image

The Top Wireless Network Security Concerns

Top Questions for Evaluating Your Wireless Network Security

The Top Wireless Network Security ConcernsWith every new technological development, comes its own weaknesses. In 2017, nearly everyone is using a wireless connection to access their internet, but at the same time, we hardly ever consider the security vulnerabilities of our network. While a wireless connection certain frees up employees to freely move around their office with their devices, by cutting the wires, we’re also putting our network security at risk. For those of you who live by the philosophy of “It’ll never happen to me…”, you may want to check up on these top wireless network concerns.

Rogue Access Points

This is a biggie. Unknown and unmanaged devices inside of a wireless network leave your business incredibly exposed. They provide easy ways in for malware and easy ways out for sensitive information. One of the first steps to take when addressing these vulnerabilities, is to enforce no-wireless zones, to make sure that AP’s don’t appear where they’re not allowed. Some organizations react to this vulnerability by prohibiting wireless access at all. In some sensitive fields, such as the military or government that may make sense, but for others, there are more sensitive ways to go about it. Even after you put policies and tools in place to monitor access points, significant management will still be necessary.

 Denial of Service

Wireless networks are especially open to Denial of Service (DoS) attacks. Since everyone shares the same frequencies, competition for the same bandwidth is almost unavoidable in highly populated areas. Modern access points have a feature to auto-adjust channels to bypass any sort of interference. To prevent any nasty DoS attack methods, you should look for the newest products that support management frame protection.


Dummy Access Points

Dummy Access Points can easily provide the same network name as a legitimate and verified hotspot of wireless network, resulting in nearby wireless clients to connect to them. While this isn’t necessarily new, simpler hacking tools have made them much more common. As soon as wireless clients connect, DHCP and DNS are used to route client traffic through the dummy AP, where fake mail and file servers execute “man in the middle” attacks. The best protection against these dummies is server authentication and validation.


Wireless Fishing

Aside from the “man in the middle” attacks, as discussed above, attackers have continued to develop new methods for phishing unsuspecting wireless users. As an example, it’s entirely possible to “poison” wireless web browser caches, so that a hacker, can get in the middle of a past web session by using a a dummy AP or an exposed hot-spot. Once poisoned, the wireless user will be directed to phishing websites long after they’ve left the dummy hotspot or access point.


wireless guide coverFor information on the top 802.11ac solutions, check out our latest Buyer’s Guide:

  • Easy, side-by-side comparison of the top 802.11ac wireless vendors
  • Descriptions of each solution and their strengths
  • Important questions to ask yourself and potential vendors when considering a solution
  • Market overview of the current 802.11ac wireless space
Download Now

Share This

Related Posts