Wi-Fi trackers provide valuable information such as: people path, crowd size, visit duration, and frequency to retailers and businesses. However, Wi-Fi trackers are also a threat for citizen’s privacy. Periodically Wi-Fi enabled portable devices broadcast a unique identifier in the clear. By collecting this identifier, it is possible to detect a visitor, triangulate their position, … Continue reading Privacy Policies of Wi-Fi Trackers
According to the Dell End-User Security Survey 2017, forty-five percent of employees across organizations admit to engaging in unsafe behaviors throughout the workday. These behaviors include connecting to public Wi-Fi to access confidential information (46 percent), using personal email accounts for work (49 percent), or losing a company-issued device (17 percent). These scenarios represent a … Continue reading 45% of employees across organizations admit to engaging in unsafe behaviors throughout the workday.
Five Fundamentals of RF for WLAN Success The following five foundational concepts are essential to implementing an effective WLAN: Channels There are more available channels to clients in 5Ghz than in the 2.4Ghz band; A reason why we should design the WLAN to operate primarily at 5Ghz. In the 2.4GHz band, we have a total … Continue reading Five Fundamentals of RF for WLAN Success
WPA2-Enterprise 802.1X/EAP Authentication Process In WPA and WPA2 PSK all clients share a common security key. Potential security issues arise because all stations in the wireless network share the same security key. Although WPA and WPA2 PSK offer many advantages, it should not be used for an enterprise wireless network. The recommended solution for most … Continue reading WPA2-Enterprise 802.1X/EAP Authentication Process
Wireless Coverage: When designing a new wireless LAN, the variables to coverage are; the power settings (which are Country dependent), antenna gain, and the physical environment. The newer enterprise grade access points on the market will automatically adjust their settings for optimal coverage, but planning a wireless network has, unfortunately, never been as simple as … Continue reading Moving from just a Coverage Design to a more Capacity Design