Prevent 'Rogue' Wireless Access Points from Sapping Bandwidth, Weakening Security

John Storts
Slide Show

Nine Steps to Securing Your Wireless Network

Steps you can take to protect your wireless network.

As wireless technology has gotten cheaper, it's become all but ubiquitous, both in professional and personal settings. With workers clamoring to use mobile devices like tablets and smartphones while on the job, the chances that these will be used as unauthorized and unsanctioned, or "rogue," access points also increases.


Wireless LANs prove difficult to manage even under the best of circumstances, so the added risks to network security and potential for robbing other bandwidth needed for legitimate uses must be curtailed. If your organization makes broad use of wireless network tech, or if IT plans to make the change soon, good policy decisions can go a long way towards minimizing resource problems and security vulnerabilities.


Download the Wireless Access Point Policy template from Info-Tech Research Group to establish clear, detailed procedures and practices for installing wireless access points throughout the business. This policy can serve as another tool in your arsenal to prevent unauthorized use or malicious attacks that can result in damage to critical applications, loss of information, damage to corporate reputation, revenue loss and bandwidth problems.


Related Content

Building a Wireless LAN for Your SMB

Using Wireless Technology Securely

'Securing the Borderless Network' Excerpt

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.




Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.