Have You Done Enough to Ensure Wireless Network Security?
Wi-Fi access is nearly everywhere. You use it at work, at home, and when you travel. But whether on a corporate Wi-Fi network or public Wi-Fi network, there are precautions you can apply to keep you better protected and your information secured.
CBRS Has Arrived
Citizens Broadband Radio Service (CBRS) is a license-free technology that is part of 5G and could potentially compete with Wi-Fi (see "Understanding 5G: CBRS"). CBRS is 150 MHz of the 3.5 GHz band made available by the FCC for commercial use. This makes spectrum available for the delivery of LTE services without requiring a license, the same as Wi-Fi.
The expectation is that CBRS will be as easy to deploy as Wi-Fi and may be a competitor to Wi-Fi. CBRS has a longer signal range equivalent to today's cellular services. It can cover a campus of buildings or municipality that would require many Wi-Fi access points. This means CBRS can experience the same security issues as Wi-Fi networks.
Wi-Fi Range Extension
A Wi-Fi range extender contains two wireless routers, similar to the wireless router you already have in your office. One wireless router receives the signal from the existing Wi-Fi network. The extender then transfers the signal to the other wireless router, which then transmits the boosted signal. The net result is that the signal range can be boosted to about 1,000 feet, well outside the office. While this may reduce your enterprise's cabling requirements, the additional range may also increase your security vulnerability by enabling access to those outside your office walls.
Read the rest of this article here on the No Jitter site.
Recommended For You
It’s time to check your computer network because the bane of many a digital security professional’s existence has returned!
Network security is complex and challenging. If you want to strengthen your network security, never follow these four tips.
In the case of cloud-deployed systems that have exposed our data, that silver lining is that we know more about where and how these breaches occur.
IT and security teams must work together to ensure a company’s entire infrastructure is protected, regardless if workloads are run on-premises or in the cloud.
Intent-based segmentation can interpret business and security requirements and converts that into a segmentation policy that protects and isolates resources.