?

FAQ

We answer all your questions about Wi-Fi network security
and our WEFENDER solution.

What is a Wi-Fi network?

A Wi-Fi network is a network infrastructure that uses wireless communication technology as a means for connecting devices to each other.

These networks offer numerous advantages over traditional wired networks, not least of which is the ease and affordability of deployment, which has led them to become tremendously popular. They make it possible to connect from any physical point without cables, thus fostering mobility and connectivity.

Are Wi-Fi networks as vulnerable as they say?

The answer is most definitely YES.

Visit our section on Wi-Fi security to see our attack demos.

Why are Wi-Fi networks so vulnerable?

The vast majority of public Wi-Fi networks that people often connect to (cafés, waiting rooms, hotels, shopping centres, coworking offices, airports, etc.) are vulnerable because:

  • You access with a pre-shared key (PSK), which is usually visible to the public and offers no ability to control or identify who is connected
  • All the users have access with the same privileges and security policy
  • It is relatively easy to spoof other devices using MAC or IP spoofing techniques
  • Most routers use the standard default configuration, which makes it easier for intruders because they all have similar parameters.

For a Wi-Fi network to be secure, each user should be able to connect with a unique password and with certain defined privileges that enable them to access certain resources while restricting access to others; in other words, everyone has their own distinct digital identity.

Why should you protect your Wi-Fi?

Many small business owners, freelancers and private users believe they do not have any valuable data or that, because they are anonymous, they won’t be the target of a cyberattack.

However, most attacks are not targeted but, instead, are part of mass campaigns in which the attackers seek access in an automated and random manner. Cybercriminals don’t even know who they are attacking, they just make automated sweeps of IP addresses until they find one that lets them in.

All cyberattacks are financially motivated. If they can lower the cost by targeting easier victims, even though the profits are lower for each one, they make up for it with the multiplication factor.

Another factor to keep in mind is that there is a wide range of attacks, and not all of them are destructive (like a locked computer or fraudulent transfers) nor are they all easily detected. Cybercriminals may simply be using your computer to engage in other attacks or to infiltrate other devices or companies.

What is WEFENDER?

The WEFENDER solution uses a router-like device equipped with proprietary technology that allows you to create a completely secure Wi-Fi network enhanced with cloud-based security services.

In a secure Wi-Fi network, all the devices connected are identified and have pre-defined security rules that determine which privileges they have when logging onto the network.

Thus, all the devices connected to WEFENDER are protected from a broad range of attacks.

What is the difference between the router installed by my Internet provider and WEFENDER?

Internet providers facilitate a connection to the exterior so that they can offer an array of services, but the devices they install are usually low-end because neither security nor the quality of the Wi-Fi signal are their priority.

WEFENDER offers the highest standards of quality and security.

On the one hand, the hardware used comes with two frequency ranges (2.4 and 5 GHz), and 2 CPUs that provide 1.3 GHz speed.

On the other, the system only accepts pre-authorized connections with secure, unique passwords and pre-determined access privileges.

This prevents the usual security problems in Wi-Fi networks.

Do I have to stop using the router from my Internet provider to use WEFENDER?

No. To benefit from WEFENDER you need to keep on using the router from your Internet provider because that is what connects you to the Internet. WEFENDER connects to your operator’s router to create a new, secure, Wi-Fi network, which means you will need to disable or forget the Wi-Fi signal of your operator’s router to prevent users from connecting to it, and only connect to the WEFENDER signal.

What kinds of attacks can WEFENDER protect me from?

WEFENDER guarantees the confidentiality and integrity of all the communications made through your network and protects it from a broad range of attacks such as:

  • Attacks using MAC and IP spoofing techniques designed to impersonate a connected device and user in order to benefit from greater privileges.
  • Man-in-the-Middle attacks, in which the information in the communications is intercepted and modified.
  • Stealing or tampering with data transferred over public or private networks
  • The spread of threats from botnets and malware that infiltrate the network through connected devices that become infected
  • DDoS attacks, also preventing the devices connected to WEFENDER from taking part in these attacks and becoming part of botnets.

What is a security policy?

A security policy is a set of decisions (privileges) that applies to each of the users and devices that can connect to the local network.

The WEFENDER solution applies a series of basic security policies to all devices and users. One of the advanced features of this solution is the option of adding other rules, known as the Tecteco Rule Set (TRS), to these policies in order to create even more customized access rules.

Who is WEFENDER intended for?

WEFENDER is a product designed especially for SMEs and the self-employed, businesses that often lack the financial and technical resources to implement adequate cybersecurity solutions.

Our service model provides cutting edge technology in a single, easy-to-use device at a perfectly affordable price.

If you are concerned about security in your home, WEFENDER is also for you. For less than half the price of an alarm, you can relax, knowing that your digital home is safe too.

ANY OTHER QUESTIONS?

 

Write to us and we’ll get back to you as soon as we can.