← Back to Learn Centre

What is rogue Wi-Fi?

Rogue Wi-Fi is an unauthorised wireless network or access point that may be used to trick users or bypass controls.

Simple example

A fake Wi-Fi network appears near the office with a name similar to the company network.

Why it matters

Rogue Wi-Fi can expose traffic, capture credentials, or provide a backdoor into the business network.

Common warning signs

  • The activity is unexpected or unusual for the business context.
  • The request or system behaviour creates pressure to act quickly.
  • Normal approval, verification, or security processes are bypassed.
  • There are signs of unauthorised access, data exposure, or system change.
  • Staff are unsure whether the request, message, or system behaviour is legitimate.

Cyber Doc view

This term should be understood in business context, not only as a technical issue. Good protection usually combines clear processes, appropriate technical controls, staff awareness, and a calm response plan.

What to do

Proactive steps

  • Use strong Wi-Fi security settings.
  • Separate guest Wi-Fi from business systems.
  • Train staff to connect only to approved networks.
  • Review wireless networks around business premises.
  • Disable unused access points.

Reactive steps

  • Disconnect from suspicious Wi-Fi immediately.
  • Change passwords if credentials may have been entered.
  • Report the network to IT or management.
  • Check affected devices for unusual certificates or settings.
  • Review network logs if business systems may have been reached.

Related terms

  • Evil twin attack
  • Network security
  • Man-in-the-middle attack