Listen here
or find us in your favorite podcast app
Today on the show we’ll be talking about more cool things. My guest is Ryan Orsi, Director of Product Management at WatchGuard. Ryan is a former MSP who also spent time at a wireless tech startup called DockOn. Now he’s with WatchGuard and he’s been working on a very interesting framework for looking at Wi-Fi security. So we’re going to talk about what that framework looks like — it’s called the TWE, the Trusted Wireless Environment — and how you can use the framework to stand out as an MSP and generate more revenue from your client base.
But first, our 1 Thing segment with Canadian MSP Tim McBride, who leads Logos IT Solutions in Alberta.
1 Thing (#MSP1T)

Tim McBride, Logos IT Solutions
[02:22] Pick your tool stack very carefully including your PSA, RMM, and even bookkeeping software. Choose the tools you’d want to use when you’re big.
[03:04] If you start cheap, your tools will be inadequate and it will be difficult to scale.
[03:26] Listen to the big guys. Don’t have a small mentality. The big guys choose the name-brand tools for a reason.
This New Wi-Fi Security Framework Brings Opportunity for MSPs: Interview With Ryan Orsi

Ryan Orsi, WatchGuard
[04:33] The TWE is the Trusted Wireless Environment Framework.
[04:49] Ryan and a team of researchers at WatchGuard created the TWE as a technical definition.
[05:20] To date, there hasn’t been a standard way for devices to be secure with Wi-Fi.
[05:50] The framework defines threats we have to worry about. There are six threats we have to worry about and there’s a very black-and-white way to detect them and handle them.
[06:09] The framework was launched in the last quarter of 2018.
[06:46] Industry feedback has been positive. People are generally interested in getting clarity on Wi-Fi security.
[08:27] WatchGuard is focusing its energies on getting the word out to MSPs. Businesses will be adopting this technology through the MSPs out there.
[09:22] WPA3 and the TWE are two different universes.
[11:06] The evil twin access point is a hacker changing their device’s name to a legitimate Wi-Fi access name and having people connect to it instead of the legit Wi-Fi.
[12:44] There are people doing evil twin attacks on themselves to test if a building or business has proper security. Search #TrustYourWifi to find examples. A high number of businesses are susceptible to this type of attack.
[13:49] That’s an untapped opportunity for MSPs to offer a service that can mitigate that threat and differentiate themselves.
[14:32] A Wi-Fi security audit can be done by checking for the six threats.
[15:15] Wireless intrusion prevention systems or WIPS can detect and prevent these threats.
[16:53] Threat number 2 is rogue access points where someone cables into the network. In these cases, you need to be able to see every device that’s on a network to know whether it should be there or not. Auvik is really good at this.
[18:24] Neighbor access points are threat number 3. This is where someone bypasses the legit business Wi-Fi and connects through an alternate SSID, perhaps to access an app that the business has banned.
[19:17] Rogue clients are victims of devices infected with malware that are waiting for the device to connect back to the network.
[20:01] Threat number five is ad hoc connections. This is where someone connects through something like AirDrop to share files. Network admins lose visibility when filers are shared computer to computer.
[20:45] Threat number six is a misconfigured access point. Someone sending out a broadcast that’s supposed to be encrypted but isn’t would be an example of a misconfigured access point.
[21:37] Get more information at TrustedWirelessEnvironment.com
[23:13] TWE should be part of a network assessment you run. Deploying one access point is all that’s needed to run the assessment.
[24:28] The TWE assessment is a wealth of valuable information for your clients and something you can monetize.
[25:32] Rogue access points are surprisingly common and not always malicious.
[26:25] Evil twins also happen all the time. Misconfiguration that could lead to security problems are common.
[27:18] MSPs should get educated on Wi-Fi security. There’s a huge gap—and a huge opportunity—in this area.
Links from this episode
- MSP Summer Treat Wave
- Timothy McBride on LinkedIn
- Logos IT Solutions
- Getting the Most From Your MSP Tool Stack – FMSP 026
- WatchGuard
- Ryan Orsi on LinkedIn
- Ryan Orsi on Twitter
- WPA3
- Trusted Wireless Environment
Subscribe
Like what you hear? Listen and subscribe.
or find us in your favorite podcast app