What is rogue Wi-Fi?
Rogue Wi-Fi is an unauthorised wireless network or access point that may be used to trick users or bypass controls.
Simple example
A fake Wi-Fi network appears near the office with a name similar to the company network.
Why it matters
Rogue Wi-Fi can expose traffic, capture credentials, or provide a backdoor into the business network.
Common warning signs
- The activity is unexpected or unusual for the business context.
- The request or system behaviour creates pressure to act quickly.
- Normal approval, verification, or security processes are bypassed.
- There are signs of unauthorised access, data exposure, or system change.
- Staff are unsure whether the request, message, or system behaviour is legitimate.
Cyber Doc view
This term should be understood in business context, not only as a technical issue. Good protection usually combines clear processes, appropriate technical controls, staff awareness, and a calm response plan.
What to do
Proactive steps
- Use strong Wi-Fi security settings.
- Separate guest Wi-Fi from business systems.
- Train staff to connect only to approved networks.
- Review wireless networks around business premises.
- Disable unused access points.
Reactive steps
- Disconnect from suspicious Wi-Fi immediately.
- Change passwords if credentials may have been entered.
- Report the network to IT or management.
- Check affected devices for unusual certificates or settings.
- Review network logs if business systems may have been reached.
Related terms
- Evil twin attack
- Network security
- Man-in-the-middle attack