{"id":73436,"date":"2023-11-22T17:16:27","date_gmt":"2023-11-22T09:16:27","guid":{"rendered":"https:\/\/version-2.com\/?p=73436"},"modified":"2023-11-07T17:18:43","modified_gmt":"2023-11-07T09:18:43","slug":"beware-the-dangers-of-the-rogue-access-point","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/11\/beware-the-dangers-of-the-rogue-access-point\/","title":{"rendered":"Beware the Dangers of the Rogue Access Point"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"73436\" class=\"elementor elementor-73436\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/11\/rogue-acces-point-tile.png\" width=\"1200\" height=\"628\" \/><\/p><div class=\"fl-module-content fl-node-content\"><p>Among one of the most insidious cyber threats that organizations face is the rogue access point. These seemingly innocent devices can unleash havoc on networks, potentially leading to data breaches, loss of sensitive information, and financial consequences. Today, we\u2019re delving into the security risks posed by rogue access points, exploring real-world examples of high-profile cyberattacks involving them, and shedding light on how Network Access Control (NAC) and TACACS+ can be leveraged to protect against these threats.<\/p><h2>Understanding Rogue Access Points<\/h2><p>Before we delve into the security risks, let\u2019s establish a clear understanding of what a rogue access point is. A rogue access point, often referred to as an unauthorized or malicious access point, is an unauthorized wireless access point that is connected to a network without the network administrator\u2019s knowledge or approval. These devices can be set up by malicious actors with the intent of eavesdropping on network traffic, stealing sensitive data, or launching attacks on unsuspecting users.<\/p><p>Rogue access points are often disguised as legitimate Wi-Fi networks, making them a formidable threat. They can be implemented by anyone with the necessary hardware and a basic understanding of wireless networking, posing a substantial risk to organizations, large or small.<\/p><h2>Security Risks Posed by Rogue Access Points<\/h2><p>Rogue access points can pose a range of security risks, including:<\/p><ul><li><strong>Data Interception:<\/strong> Attackers can intercept sensitive data transmitted over the network, potentially compromising confidential information, such as usernames, passwords, and credit card details.<\/li><li><strong>Man-in-the-Middle Attacks:<\/strong> Rogue access points can act as <a href=\"https:\/\/www.portnox.com\/blog\/network-security\/stopping-a-man-in-the-middle-mitm-attack\/\" target=\"_blank\" rel=\"noopener\">intermediaries between the victim and the legitimate network<\/a>, enabling attackers to capture, modify, or inject data into the communication stream.<\/li><li><strong>Malware Distribution:<\/strong> Attackers can use rogue access points to distribute malware to connected devices, leading to further compromise of network security.<\/li><li><strong>Credential Theft:<\/strong> Users who connect to a rogue access point might unwittingly enter their login credentials, which can then be harvested by attackers.<\/li><li><strong>Network Disruption:<\/strong> Malicious access points can disrupt the normal functioning of the network, causing downtime and potential financial losses.<\/li><\/ul><h2>Real-World Examples of High-Profile Cyber Attacks Involving Rogue Access Points<\/h2><p>To truly grasp the severity of the threat posed by rogue access points, let\u2019s explore a few real-world examples of high-profile cyberattacks that leveraged these stealthy adversaries.<\/p><h3>TJX Companies Data Breach (2005)<\/h3><p>In one of the largest data breaches in history, the TJX Companies<a href=\"https:\/\/www.zdnet.com\/article\/wi-fi-hack-caused-tk-maxx-security-breach\/\" target=\"_blank\" rel=\"noopener\"> suffered a massive security breach in 2005<\/a>. Attackers, using rogue access points, intercepted wireless network traffic in various TJX-owned stores. The breach compromised over 94 million credit and debit card records, highlighting the devastating impact that rogue access points can have on a business\u2019s reputation and financial standing.<\/p><h3>Target Data Breach (2013)<\/h3><p>In 2013, retail giant <a href=\"https:\/\/redriver.com\/security\/target-data-breach\" target=\"_blank\" rel=\"noopener\">Target fell victim to a rogue access point attack<\/a>. Attackers gained access to the network through an HVAC vendor\u2019s compromised credentials, then installed rogue access points within the network to capture credit card data. The breach exposed the financial data of around 40 million customers and resulted in significant financial and reputational damage to Target.<\/p><h3>The DarkHotel APT Group<\/h3><p>The <a href=\"https:\/\/www.zdnet.com\/article\/suspected-darkhotel-apt-resurgence-targets-luxury-chinese-hotels\/\" target=\"_blank\" rel=\"noopener\">DarkHotel Advanced Persistent Threat (APT)<\/a> group is notorious for targeting high-profile individuals, such as executives and government officials. In some of their campaigns, they have deployed rogue access points in luxury hotels to compromise the Wi-Fi networks used by their targets. This demonstrates the adaptability of rogue access points in the hands of skilled cybercriminals.<\/p><h2>Mitigating Rogue Access Point Threats with NAC and TACACS+<\/h2><p>To defend against the pervasive threat of rogue access points, organizations can employ a combination of <a href=\"https:\/\/www.portnox.com\/solutions\/network-access-control\/\" target=\"_blank\" rel=\"noopener\">Network Access Control (NAC)<\/a> and <a href=\"https:\/\/www.portnox.com\/solutions\/tacacs\/\" target=\"_blank\" rel=\"noopener\">Terminal Access Controller Access Control System Plus (TACACS+)<\/a>. These security measures offer a multi-layered approach to securing networks and minimizing the risk posed by unauthorized access points.<\/p><h3>Network Access Control (NAC)<\/h3><p>NAC is a security solution that helps organizations control and monitor devices seeking access to their networks. <a href=\"https:\/\/www.portnox.com\/blog\/network-access-control\/securing-your-digital-eco-system-the-role-of-access-control-in-network-security\/\" target=\"_blank\" rel=\"noopener\">It enforces security policies<\/a>, ensuring that only authorized and compliant devices can connect to the network. Here\u2019s how NAC can help mitigate rogue access point threats:<\/p><ul><li><strong>Endpoint Assessment:<\/strong> NAC solutions can assess the security posture of devices before granting them network access. This includes checking for the presence of rogue access points or suspicious network activity.<\/li><li><strong>Continuous Monitoring:<\/strong> NAC solutions continuously monitor devices once they\u2019re connected to the network, alerting administrators to any unauthorized or suspicious activity.<\/li><li><strong>Policy Enforcement:<\/strong> NAC can enforce strict policies that prohibit the use of rogue access points, ensuring that only authorized access points are allowed.<\/li><li><strong>Quarantine and Remediation:<\/strong> When rogue access points or compromised devices are detected, NAC can quarantine them to prevent further network access. It can also facilitate remediation efforts to resolve security issues before allowing the device back on the network.<\/li><\/ul><h3>Terminal Access Controller Access Control System Plus (TACACS+)<\/h3><p>TACACS+ is a robust <a href=\"https:\/\/www.portnox.com\/portnox-cloud\/tacacs\/\" target=\"_blank\" rel=\"noopener\">authentication, authorization, and accounting (AAA) protocol<\/a> that enhances network security by controlling access to network devices. When used in conjunction with NAC, TACACS+ offers a powerful defense against rogue access points:<\/p><ul><li><strong>Centralized Authentication:<\/strong> TACACS+ centralizes authentication, reducing the risk of unauthorized devices or access points infiltrating the network.<\/li><li><strong>Detailed Access Control:<\/strong> TACACS+ provides granular control over who can access network devices, making it more challenging for rogue access points to go unnoticed.<\/li><li><strong>Logging and Auditing:<\/strong> TACACS+ keeps detailed logs of authentication and access attempts, which can help identify and track rogue access point activity.<\/li><li><strong>Session Termination:<\/strong> TACACS+ allows administrators to terminate sessions and access to network devices promptly when unauthorized or suspicious activity is detected.<\/li><\/ul><p>Rogue access points are a silent, yet potent threat that can compromise the security of organizations and individuals. By learning from high-profile cyberattacks and implementing robust security measures such as Network Access Control (NAC) and Terminal Access Controller Access Control System Plus (TACACS+), organizations can fortify their defenses against rogue access point threats. In an era where connectivity is essential for business operations and personal life, securing networks against rogue access points is of paramount importance. By staying vigilant, educating employees, and deploying advanced security solutions, we can effectively thwart these invisible adversaries and maintain the integrity of our networks. The lesson is clear: when it comes to rogue access points, it\u2019s better to prevent than to remediate.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Among one of the most insidious cyber threats that orga [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,1075,61],"tags":[352,423,1076],"class_list":["post-73436","post","type-post","status-publish","format-standard","hentry","category-portnox","category-year2023","category-press-release","tag-network","tag-portnox","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Beware the Dangers of the Rogue Access Point - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/beware-the-dangers-of-the-rogue-access-point\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beware the Dangers of the Rogue Access Point - Version 2\" \/>\n<meta property=\"og:description\" content=\"Among one of the most insidious cyber threats that orga [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/beware-the-dangers-of-the-rogue-access-point\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-22T09:16:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/11\/rogue-acces-point-tile.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/beware-the-dangers-of-the-rogue-access-point\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/11\\\/beware-the-dangers-of-the-rogue-access-point\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Beware the Dangers of the Rogue Access Point\",\"datePublished\":\"2023-11-22T09:16:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/11\\\/beware-the-dangers-of-the-rogue-access-point\\\/\"},\"wordCount\":1033,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/beware-the-dangers-of-the-rogue-access-point\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/rogue-acces-point-tile.png\",\"keywords\":[\"Network\",\"Portnox\",\"2023\"],\"articleSection\":[\"Portnox\",\"2023\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/beware-the-dangers-of-the-rogue-access-point\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/11\\\/beware-the-dangers-of-the-rogue-access-point\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/beware-the-dangers-of-the-rogue-access-point\\\/\",\"name\":\"Beware the Dangers of the Rogue Access Point - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/beware-the-dangers-of-the-rogue-access-point\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/beware-the-dangers-of-the-rogue-access-point\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/rogue-acces-point-tile.png\",\"datePublished\":\"2023-11-22T09:16:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/beware-the-dangers-of-the-rogue-access-point\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/beware-the-dangers-of-the-rogue-access-point\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/beware-the-dangers-of-the-rogue-access-point\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/rogue-acces-point-tile.png\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/rogue-acces-point-tile.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/beware-the-dangers-of-the-rogue-access-point\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beware the Dangers of the Rogue Access Point\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beware the Dangers of the Rogue Access Point - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/beware-the-dangers-of-the-rogue-access-point\/","og_locale":"en_US","og_type":"article","og_title":"Beware the Dangers of the Rogue Access Point - Version 2","og_description":"Among one of the most insidious cyber threats that orga [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/beware-the-dangers-of-the-rogue-access-point\/","og_site_name":"Version 2","article_published_time":"2023-11-22T09:16:27+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/11\/rogue-acces-point-tile.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/beware-the-dangers-of-the-rogue-access-point\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/11\/beware-the-dangers-of-the-rogue-access-point\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Beware the Dangers of the Rogue Access Point","datePublished":"2023-11-22T09:16:27+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/11\/beware-the-dangers-of-the-rogue-access-point\/"},"wordCount":1033,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/beware-the-dangers-of-the-rogue-access-point\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/11\/rogue-acces-point-tile.png","keywords":["Network","Portnox","2023"],"articleSection":["Portnox","2023","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.portnox.com\/blog\/cyber-attacks\/beware-the-dangers-of-the-rogue-access-point\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/11\/beware-the-dangers-of-the-rogue-access-point\/","url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/beware-the-dangers-of-the-rogue-access-point\/","name":"Beware the Dangers of the Rogue Access Point - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/beware-the-dangers-of-the-rogue-access-point\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/beware-the-dangers-of-the-rogue-access-point\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/11\/rogue-acces-point-tile.png","datePublished":"2023-11-22T09:16:27+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/beware-the-dangers-of-the-rogue-access-point\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/cyber-attacks\/beware-the-dangers-of-the-rogue-access-point\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/beware-the-dangers-of-the-rogue-access-point\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/11\/rogue-acces-point-tile.png","contentUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/11\/rogue-acces-point-tile.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/beware-the-dangers-of-the-rogue-access-point\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Beware the Dangers of the Rogue Access Point"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-j6s","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/73436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=73436"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/73436\/revisions"}],"predecessor-version":[{"id":73443,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/73436\/revisions\/73443"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=73436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=73436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=73436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}