Energy farms in the high desert. Remote agricultural sites aggregating data via the Internet of Things (IoT). Retailers putting on a show with pop-up events. All of them needing business-grade internet access … and many of them taking advantage of modern wireless connectivity to provide it.
Yes, Fixed Wireless Access (FWA) is here to stay.
But when critical business data is involved, what’s uppermost in the minds of IT managers is security. Even among nontechnical types, sending private information over the air seems somehow riskier than sending it down a wire, doesn’t it?
The good news: when correctly implemented, FWA doesn’t give anything away to wired networks on the security front. In fact, there are use cases where your data’s wrapped up tighter than in a wired world. But as with all technology, there are nuances. In this article, we’ll go through the worries – and show how FWA answers each one.
1. Maintain best data practice on FWA
At heart, an FWA network is no different in purpose to a wired one – it’s there to help your people connect and work together. Most of the time, using it feels just like any other connection method. And that’s the first vulnerability to solve.
Sadly, a huge percentage of cyberattacks start not by compromising the network, but by compromising the people using it. (Hackers don’t care whether you’re wired or wireless.) The easiest way in for bad actors is often a phishing attack that invites people to click a malware link ... or the spear-phishing variant that targets specific individuals with knowledge about them … and automated attacks seeking weak passwords or open ports in your infrastructure.
It’s a jungle out there. And the wildlife is ferocious.
So the first rule of fixed wireless security is that any FWA installation needs good data practice from your people, the same as any other network. Train them in strong password choice, suspicious activity awareness, and basic privacy procedures that reduce the chance of human error. It’s the first line of defence – and often legally required, too.
2. Use multi-factor authentication
Beyond basic data best practice comes authentication: making sure people are who they say they are. And that means more than a typed password. So, confirming people’s identity with more than one factor – such as an OTP (One Time Password) to their phone – is always a good idea.
But if your site is far from normal mobile coverage, this makes some methods of MFA impossible. An FWA router brings in the data service offered by a specific network provider; it doesn’t extend general mobile phone coverage to your remote farm or factory .
Fortunately, today’s technology offers more choices than OTP. Facial recognition, authenticator apps, tokens exchanged by software: there are many choices. And they’re just as easy to use with fixed wireless access as with a “normal” connection. So, make sure your network is using them.
3. Cellular networks aren’t like broadcast radio
Another worry of wireless is that people think it’s like radio – with data being “broadcast” the same way your favourite DJ spins his playlist, with a risk bad actors will “tune in”.
If you’re concerned about this, relax. It’s not how FWA works.
While the cellular networks much FWA relies on do use radio waves (like all wireless communications, including your WiFi) it’s not a broadcast channel. Data across the network is encrypted by design. The packets of data that go between the SIM in your FWA router and the mobile network are secured by high-grade hashing algorithms developed and proven over many years, as a basic feature of digital telephony.