{"id":397,"date":"2017-10-18T03:23:58","date_gmt":"2017-10-18T03:23:58","guid":{"rendered":"https:\/\/hotlineit.launchmedigital.com\/?p=397"},"modified":"2018-12-04T12:34:52","modified_gmt":"2018-12-04T12:34:52","slug":"wi-fi-security-tips","status":"publish","type":"post","link":"https:\/\/staging.hotlineit.com\/wi-fi-security-tips\/","title":{"rendered":"A Krack in WI-FI Security: Wi-Fi Security Tips for Your Business"},"content":{"rendered":"
Nearly every device we use has Wi-Fi capabilities \u2013 from smartphones to laptops, iPads and TVs. The security protocol WPA2 \u2013 the norm for Wi-Fi password security worldwide can be compromised. It\u2019s fact. This means hackers can potentially exploit the comprise in the code and inject malware such as ransomware into websites and ultimately read your sensitive data. Protecting your network from this threat is top of the list of Wi-Fi security tips your business needs to heed.<\/p>\n
An attacker within range of your Wi-Fi device can exploit the weakness of the WPA2 protocol using a \u201cKey Reinstallation Attack\u201d also known as a KRACK. With this form of attack, hackers can read sensitive information that was previously encrypted. This includes your credit card numbers, passwords, chat messages and emails.<\/p>\n
Vanhoef found a problem with the code behind the WPA2 encryption protocol. This essentially means that all devices you are using are vulnerable to hackers. They’re easy prey for those trying to intercept internet traffic flowing to and from any device with a Wi-Fi connection. This is a high risk for users when you could be dealing with sensitive information such as your banking accounts.<\/p>\n
For your Wi-Fi to be compromised the hacker needs to be in range of your WiFi network. They can\u2019t attack you outside of your network, for example, from another country. Attackers can\u2019t obtain your Wi-Fi password using this vulnerability. Rather, they can just look at your unencrypted traffic if they know what they\u2019re doing.<\/p>\n
Mr Vanhoef warns that any device that supports Wi-Fi is likely affected by KRACK, but that Linux-based devices, as well as Android devices running version 6.0 or higher of the Android operating system, are especially at risk. At the moment that currently includes more than 40% of Android devices.<\/p>\n
Many operating systems and applications (including web browsers) use additional security methods to prevent eavesdropping. However, while sensitive data like credit card information are hard for hackers to extract, they’re not impossible.\u00a0<\/strong><\/p>\n In terms of positive news, \u201cKRACK\u201d a simple software update will fix the problem in most devices. Microsoft has already released a patch for Windows that fixes the flaw and Apple will roll out an update as they are currently finalising patches for iOS, MacOS, WatchOS and TVOS that will be available in the next few weeks.<\/p>\n Ideally it\u2019s key for all Wi-Fi users to ensure that all of their devices are updated with the latest possible softwares in order to reduce the risk of a hacker gaining access to your sensitive materials. It\u2019s also important to note that users need to be aware when connecting to Wi-Fi run by small businesses as they do not generally have the IT infrastructure to prevent an attack. Take note of these critical wi-fi security tips and you’ll be on your way to solving your wireless network security issues.<\/p>\n For more information on how to secure your wireless network, call Hotline IT today<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":" Wi-Fi Security Tips from Hotline IT Nearly every device we use has Wi-Fi capabilities \u2013 from smartphones to laptops, iPads and TVs. The security protocol WPA2 \u2013 the norm for Wi-Fi password security worldwide can be compromised. It\u2019s fact. This means hackers can potentially exploit the comprise in the code and inject malware such as … Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":691,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"acf":[],"yoast_head":"\nSo, what can we all take away from this situation?<\/strong><\/h3>\n