• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

How to Avoid FCC Wi-Fi Interference Fines with New WIPS Technology

April 11, 2017 By Jason Vendramin

The dangers of free wi-fi
Wireless Intrusion Prevention Systems (WIPS) offer the ability to shut down dangerous or “rogue” Wi-Fi access points and clients. This is normally used to block the fake access points (APs) and client attack tools that hackers use to steal people’s personal data. But, many WIPS misclassify legitimate APs as dangerous and block them because their classification methods are prone to false positives and negatives. Not only is this annoying for customers or neighbors, but because the FCC has banned manufacturers from creating Wi-Fi devices that interfere with other Wi-Fi devices, it can be costly too.

For example, in 2014, Marriott was fined $600,000 after blocking consumer Wi-Fi networks (like phone hotspots) during an event at one of their hotel and conference centers. This led to more fines for other event organizers and hospitality companies in a “crackdown” over the next few years. In 2015, Wi-Fi service provider M.C. Dean was fined a record $718,000 for blocking Wi-Fi routers at a Baltimore convention center. Network World investigated the Wi-Fi blocking issue and found more than 50 complaints resulted in nearly $2.1 million in total fines.

The unfortunate result of all this is that many organizations have abandoned some of their WIPS security features in fear of blocking innocent APs and being fined by the FCC. WIPS usually offer an auto-block feature that’s a useful time-saver for overwhelmed security and network engineers. But, if the WIPS cannot identify the difference between a rogue AP and a device’s hotspot (or the router in the café next door) with a low margin of error, turning on auto-blocking could result in fines. Too many false positives also encourage engineers to ignore or turn off alerts, and investigating each one manually is not a realistic option for most organizations.

Fortunately, WatchGuard has solved this problem with our latest Wi-Fi Cloud WIPS/Wi-Fi Management platform. Our Marker Packet technology included in our new cloud-ready APs injects special packets into your wired network. These packets are then relayed to the wireless side by APs connected to the monitored wired network and are used to verify that any other AP or device in range is part of that network. Wi-Fi Cloud automatically classifies wireless devices as Authorized, Rogue or External with an extremely low false positive rate, so users can let the system automatically shut down unauthorized APs without illegally interfering with the neighbors. Click here to see how this works.

Dependable AP auto-classification is the key to reliable WIPS, which can eliminate FCC fines and ensure precision rogue detection. WatchGuard is the only provider that offers this level of performance and reliability.

Learn more about Wi-Fi Cloud here, and read more about its classification technology and other Wi-Fi management, analytics and marketing data features here on Secplicity.

Share This:

Related

Filed Under: Editorial Articles

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • US National Cybersecurity Strategy
  • 3CX Supply Chain Attack
  • Here Come The Regulations

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • 3CX Supply Chain Attack
  • The NSA’s Guidance on Securing Authentication
  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use