Bluestar Industry News

News and views on the latest Technology solutions

How to defend against the targeting of your business?

June 3th, 2019

Wi-Fi has become a standard in our daily lives. While customers and employees wonder around on their smartphones or other wireless devices, you need to allow them access on your Wi-Fi network. But what about the security risks that can transpire when involving Wi-Fi? Have you ever thought about the danger that can be involved when a person connects their device to your wireless internet? If not, you should! Adding security to your wireless internet is a must in order to stop the chance of information being stolen from your company. 

Here are 4 Wi-Fi threats that could be targeting your business 

  •  In stores where customers have free access to Wi-Fi, it can be easy for the network administrators to unconsciously make a configuration mistake, such as making a private SSID open with no encryption. This can potentially expose sensitive information to the interception over the air. But how can this happen? Any time an access point is not set up correctly, for example leaving the settings on default.
  • Hackers can create a twin AP, which will imitate the legitimate AP, thus deceiving its SSID and unique MAC address. The hacker can then intercept traffic and insert themselves into the data conversation between the victim and the servers while connected to the twin AP.  In other words, the attacker is then connected to your systems, and is able to steal credentials, place malicious codes into the browsers, redirect the malware site, and so much more.
  • Another threat is a wireless AP that has been installed on a secure network without explicit authorization from the administrator, this is called a rogue AP. Rogue APs are connected to the authorized network, usually with an open SID, allowing the hackers to bypass your perimeter security 
  • A rogue AP is creating consequently more issues. A client previously connected to a rogue AP within the range of a private network is considered a rogue client. This can have consequences as the client will have no idea but as they connect to your wireless internet the virus will inject into your system and load ransom worms, malware or back doors onto the client.   

One thing you should remember is to never compromise your security position to achieve the performance levels necessary to support your Wi-Fi environment’s speed, connection and client density. You do not want your employees connecting to a less secure Wi-Fi just to get faster internet. A high-performing wireless network not only keeps employees connected to the secure networks, but also keeps them operating at peak efficiency. 




Keep your finger on the pulse with the latest news on Technology Solutions delivered directly to your inbox!

placeholder

BLUESTAR EUROPE
Koninginnegracht 19
2514 AB Den Haag

T: +31 880 233 633
E: salesnl@bluestarinc.com
www.bluestarinc.com/nl

BlueStar Privacy Policy

FOLLOW US

Follow Bluestar on Twitter Follow Bluestar on Flickr Follow Bluestar on Facebook Follow Bluestar on LinkedIn Follow Bluestar on Youtube

SELECT YOUR LANGUAGE

Select the English Language version of this Blog Select the German Language version of this Blog Select the French Language version of this Blog Select the Spanish Language version of this Blog Select the Italian Language version of this Blog