We’ve been talking a lot lately on how crucial it is for organizations to enable a Trusted Wireless Environment. Now that working remotely is our “new normal,” and not every company is able to send an AP225W wall plate access point home with everyone, we covered 5 tips that would keep remote workers safe and Wi-Fi hackers away in a previous blog, but here’s a refresher: … [Read more...]
WFH? Now is the Time to Retain Control of Your Wi-Fi Network
The last few weeks have been “interesting” to say the least. The global COVID-19 pandemic has forced much of the workforce to work remotely to help slow the spread of the disease. Working from home can introduce security concerns related to Wi-Fi. With more employees working from home comes the increased vulnerability of people using Wi-Fi, and there is not enough education … [Read more...]
Ruckus (Commscope) Access Points Put to The Hackers’ Test
Did they pass? You’ll have to read on to find out... Ruckus, which is now a part of Commscope via acuquisition in 2018, came into the business-class Wi-Fi market in 2002 with a disruptive antenna design. At the time, the antenna technology was quite novel and utilized multiple electrically-steerable antenna arrays to focus signal to desired targets such as laptops or mobile … [Read more...]
How To Stop Wi-Fi Hackers Abusing Ubiquiti’s UniFi Access Points
Ubiquiti, a global networking technology company came onto the mainstream marketplace beginning in 2005 with a clever idea of offering products at low prices to mass markets guiding channel players to monetize their services instead of the hardware. Every strategy has its pluses and minuses and some would say Ubiquiti’s low-price leader concept swung the pendulum too far, … [Read more...]
Meraki’s Air Marshal Gets Help from a New WIPS Sheriff
Wi-Fi hacking is a hot topic, but one that’s plagued by ambiguous and often contradictory technical terminology. Luckily, the lack of common definitions for Wi-Fi threat vectors has actually produced a solution to the problem: the Trusted Wireless Environment. The Trusted Wireless Environment framework succinctly defines the six Layer 2 Wi-Fi hacks that affect nearly every … [Read more...]