Blog Post

Wi-Fe Be as the Biggest Security Gap

Jan 15, 2019

More than 75% of all mobile communications flows over Wi-Fi. In 2017, 8.4 billion devices were connected to Wi-Fi and the volume is expected to hit 20.4 billion by 2020, according to analyst firm Gartner.

In 2018, 52.2% of all website traffic worldwide was generated through mobile phones, up from 50.3 percent in the previous year. Hackers prefer to go after the weak link in the security chain and it doesn’t take much to hack into the Wi-Fi network using easily accessible tools and a plethora of online how-to videos. Even the most rookie hacker can intercept traffic flowing over Wi-Fi and steal valuable data from your smartphone, tablet, smartwatch, or laptop. Once the malware is injected and credentials are stolen over Wi-Fi, your business networks become compromised, and it can cost millions in fines and breach remediation expenses to fix.

The Six Known Wi-Fi Threat Categories That Leave Your Business Vulnerable

  1. Rogue Access Point (generates your wireless network): Allows attackers to bypass perimeter security
  2. Rogue Client (such as your computer or smartphone): Delivers malware payloads to the network after connecting to malicious APs.
  3. Neighbouring Access Point or Client false association: Risks infection from connecting to other networks while in range of the authorised AP.
  4. Ad-Hoc Network: Uses peer-to-peer connections to evade security controls and risk exposure to malware.
  5. "Evil Twin" Access Point: Tempting users to connect to it so as to spy on traffic, steal data and infect systems.
  6. Misconfigured Access Point: Opens networks to attack as a result of configuration errors.

What is a Trusted Wireless Environment?

In a world with growing open Wi-Fi networks, Wi-Fi hackers are able to not only steal personal information but also spread malware to computers on the network, costing your businesses millions. Simply put, the Wi-Fi system that you installed seven years ago is no longer adequate. As you face the responsibility of evolving your Wi-Fi networks, it's best to get your IT Provider involved in the process to help you make the right decisions. Companies that offer a Trusted Wireless Environment deliver on these three core pillars:

Market-Leading Performance:
You should never be forced to compromise security to achieve the necessary performance to support your environment with the speed, connections and client density that it needs.

Scalable Management:
With easy set-up and management, your entire wireless network should be able to be controlled from a single interface and execute key processes to safeguard the environment and its users.

Verified Comprehensive Security:
You need proof that the security solution that defends your business against Wi-Fi attacks can deliver on the following benefits:

  • Provide automatic protection from the six known Wi-Fi threat categories
  • Allow legitimate external access points to operate in the same airspace
  • Restrict users from connecting to unsanctioned Wi-Fi access points

Best practice is to install more than just Wi-Fi connectivity by also consider Wi-Fi security which automatically detects and prevents all of the most common Wi-Fi threats simultaneously.

Share by: