EnGenius has always been good at coming up with easy to deploy and easy to manage WiFi, PoE, and networking products. And the EnGenius ECW130 Indoor Wireless Access Point certainly fits that bill. But what makes this a bit different is the price. I found it online for $214 CDN per access point which makes it more than affordable. And if you combine that with the features that I am about to talk about, this access point is a winner in my eyes. Let’s start with what this access point is capable of:
- Fast and reliable AP utilizing 4 spatial streams and MU-MIMO for any professional office
- Supports up to 1,733 Mbps in 5-GHz band & 800 Mbps in 2.4-GHz band
- 802.11ac wave 2 compatible with ax/ac/a/b/g/n client devices
One thing to note is that while there is an AC adapter plug as you will see in a moment, there’s no AC adapter in the box. Thus you have to be running Power over Ethernet or have an adapter like this one .
As for the physical aspects of the access point:
This is a ceiling mounted access point, and other than the LEDs at the top, there’s not a whole lot here to see. Speaking of being ceiling mounted, all the hardware you need to mount it is in the box.
You’ll note that there are two Ethernet ports. The main one is the one on the right which supports Power over Ethernet. The second one is to be used if you want to bring even more bandwidth to the access point. Or put another way, this access point supports link aggregation. You’ll also see the DC IN plug for power.
I should also mention the box that it came in. The box is made of recycled materials and has a pair of QR codes. One to allow you to download the mobile app, and one that gives you access to the quick start guide. That should help people to install this easily. Speaking of which, once you download the mobile app, it’s laughably easy to set up. As in scan a barcode on the back of the housing and spend a few minutes getting settings that work for you configured. You might also want to check for a firmware update to make sure that you’re good to go. And one other thing that I have to say is that the EnGenius cloud management is amazing. I’ve put their access points into a number of my commercial clients and being able to manage them from anywhere is a huge productivity boost as you can update firmware from your smart phone, or reboot a problematic access point from your living room while watching a Formula 1 race. And it doesn’t cost you anything to use.
So, how about the speed from this access point? Since it doesn’t do anything more than WiFi 5, I wasn’t expecting blazing fast speeds. But it doesn’t suck. Doing file copies, I registered an average of 100MB/sec at close range. When I move to the other end of my condo which I measured to be about 10 meters, the speed dropped to 75MB/sec. These are all respectable speeds and won’t cause complaints from anyone.
Now who would I recommend this access point for? A small business who needs WiFi, but doesn’t need the fastest WiFi because price matters more than speed to them. Alternatively a home user could put commercial grade WiFi into home at a low price point. And if either use case really needs WiFi 6, EnGenius will happily sell you their ECW230 which has everything that you just read about, but brings WiFi 6 to the party.
The ECW130 from EnGenius has a great price point and a lot of features packed in with a healthy amount of performance. This is an access point that’s worth your time to look at as long as you absolutely don’t need WiFi 6 in your life.
Google Report Highlights Weak Passwords Account For Almost Half Of Security Breaches…. Yikes!
Posted in Commentary with tags Google on April 15, 2023 by itnerdGoogle is reporting that weak passwords accounted for almost half of security breaches affecting Google Cloud customers. Google is seeing nation state actors finding success exploiting “weak identity verification practices” according to Chris Porter, head of threat intelligence for Google Cloud “The percentage that’s a software issue or a zero-day, you know, it’s not zero, but it goes down and down and down. That’s a trend we generally expect to continue,” Porter said.
Google reports that compromise of API’s to gain permissions into a company systems is the second most common avenue of attack on their cloud systems and accounted for nearly one fifth of all reported incidents. They point out that ransomware attacks in the cloud, threatening to release stolen data, have become common events.
I have three comments on this. The first is from Willy Leichter, VP, Cyware:
“This report seems depressingly familiar, that our oldest security problems – poor password practices and leaked API credentials, lead to the majority of attacks. But we must move beyond our typical response – trying to train and cajole end-users to be more careful. We need to assume that users will be careless, design better defense-in-depth, and leverage the explosion of AI tools to detect poor security practices, and advanced attacks that will always find weak points to exploit.”
The next is from Roy Akerman, Co-Founder & CEO, Rezonate:
“This confirms the same exact information we have seen for the past decade. Identity was and remains the biggest risk, and the true “zero-day”, organization must address with priority. Current identity security approaches are fragmented across many tools and teams and does not fit today’s reality of a constantly changing infrastructure. Identity security hasn’t evolved for the past decade for the purpose of detecting identity exploitation. We were too busy managing and allowing access vs monitoring and detecting unauthorized access behaviors and a true end-to-end view across all stages of the identity lifecycle.”
The final comment is from George McGregor, VP, Approov:
“The combination of weak passwords and careless API key management is a dangerous cocktail which opens up APIs as an attack surface for hackers. Better discipline in general is of course important, but developers should also put in place runtime solutions to prevent stolen keys being exploited. This can be done effectively by using app and device attestation combined with secret management solutions which allow keys to be rotated immediately if compromised or changed.”
This is depressing and hopefully this report from Google serves as a wake up call to do better on the security front. Because we live in a time where not doing better will end badly more often than not.
Leave a comment »