What’s Government’s Role In Protecting Wireless Networks?

Posted: April 6, 2017 / Author: Dror Liwer

Both private businesses and governmental agencies are increasingly concerned about the mounting threats to wireless devices and networks. However, government approaches to dealing with the problem vary dramatically. From India, through the United States to the United Kingdom steps have taken range from full blown bans on use of wireless devices in the government workplace to the expansion of BYOD policies.  In a previous blog post, we detailed how BYOD-friendly companies have declined by 20% since 2013, with 53% of all companies now banning private devices altogether. However, with reliance on the devices far from a downward trend, which government…

Read More
Recent Posts

What Dangers Lurk In Your Wireless Network?

Posted: March 9, 2017 / Author: Dror Liwer

Companies across the spectrum are already familiar with a wide range of cyber threats, including; DDoS attacks, phishing email schemes, ghostware and cloud jailbreaking among many others, because these are the ones the media is quick to pick up on. However, there is a lack of awareness regarding a host of wireless network attacks that can be just as damaging if not more. The lesser known wireless threats and what they can do to your enterprise.   Threat #1 – Access Point Mapping: This threat is referred to as access point mapping or wardriving. Access point mapping is conducted by…

Read More

How to Balance Wireless Network Security With the Thirst for Increased Connectivity

Posted: February 7, 2017 / Author: Dror Liwer

With workers relying more than ever on mobile devices to provide quick access to information, BYOD and BYON have become as ubiquitous and as necessary as office furniture. Yet, even though the “Bring Your Own” approach has revolutionized business, many companies still have a pre-revolutionary view to network cybersecurity. Companies still place great emphasis on protecting the network in the office by relying on many security layers: the firewall, Internet Protocol restrictions and network access control, even though they don’t…

Read More
More Posts

How Good Wireless Visibility Can Beat the Rogue Access Points

Posted: January 26, 2017 / Author: Dror Liwer

With wireless security, it’s all about visibility. Look around a coffee shop, airport, or even an office building and it’s impossible to miss all the smartphones, tablets and laptop computers. Just about everyone has a wireless device. But the downside to all these devices – and thus the downside to BYOD also – is a security threat that’s not clearly visible: rogue access points. The proliferation of mobile devices prompted a surge of wireless access points, enabling people to connect…

Read More