Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:25 AM

Saying 'No' to WiFi

Right next door to a Starbucks, Blue Cross of Idaho looks to Network Chemistry for an 802.11 lockdown

It's one of the little ironies of the enterprise WiFi revolution that now some companies have to buy 802.11 gear in order to enforce mandated "no wireless" security policies.

Jan Marshall, who runs network and technical services at major healthcare insurance firm Blue Cross of Idaho, says that he was looking for flexibility when he decided to try and enforce his company's RF lockdown policy.

"Network Chemistry Inc. gave us the most flexibility out of all of them," says Marshall. "We did our research on the Internet and this was the best fit for us."

Network Chemistry's RFprotect product line uses dedicated security scanners to detect and block wireless transmissions. Marshall has already bought 21 units to cover Blue Cross's 800 employees in a three-building campus. He expects to add more when a fourth office is completed.

One of the reasons that Marshall likes the system is that it's easy to change between a strict lockdown and allowing limited access to wireless. "We can go into the console and say we're going to authorize wireless from this access point to these PCs for a certain period of time and it does it automatically."

"The other thing we needed to consider was our neighbors," says Marshall. The Blue Cross buildings are situated right beside a Starbucks, which pumps out a strong WiFi signal along with overpriced, over-caffeinated coffee. Network Chemistry's system allows the network manager to block authorized users from associating with unauthorized access points, and vice versa.

"It's intelligent enough to stop them from being interfered with, but will protect our buildings," says Marshall.

According to Marshall, it took roughly three weeks from start to finish to install the scanners onsite. This included a couple of days for a contractor to install more wiring and hook up the Network Chemistry units. Marshall estimates that the project cost around $35,000 in all.

— Dan Jones, Site Editor, Unstrung

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.