Most operating systems developed over the past two or more years have been designed to be very "wireless aware", meaning that they can easily be set up to work with wireless networks. Some may argue that software environments like Windows XP are a little too aware, since it is structured to sniff out the strongest Wi-Fi signal and lock onto it to allow access to the related wireless and wired networks. This can be a problem if you or your workers "accidentally associate" with an outside wireless AP and start channeling data or sending and receiving e-mail through that unauthorized AP. The problem becomes more severe if this outside AP is a "rogue access point" or "honey pot" that was deliberately set up to attract wireless signals and intentionally pen a wireless doorway into your sensitive data.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Dig Deeper on Enterprise mobility strategy and policy
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.