Installing networks in an enterprise is not difficult, but failure to the proper configuration and level of security can carry serious consequences. Any viewed websites, their content, transmitted data or private correspondence – all this can be accessed by a cybercriminal. Such danger lurks also in the situation of using open WIFI networks. How to protect yourself from the tentacles cybercriminals i data leakage?
It seems, , that attacking an unsecured WIFI network is a rather outdated way of cyber attack. However, the fact remains that such threats still occur. In addition to this insecurity within WIFI networks involves attacks on networks in general and Internet of Things (IoT) devices.
Most common causes of WIFI attack
On the one hand, it could be hardware defects, such as errors in hardware components or Wi-Fi security protocols. To a large extent, the causes also lie in the human factor:
- Performing default
device configuration - Outdated routers exposed to
dangers - Routers with WEP(Wired
Equivalent Privacy) protocol, which is very
easy to break - Weak and default passwords (and using one password for
multiple services) - Weak encryption.
Attacks on WIFI networks: circumstances.
A major temptation for Internet intruders are public places with open WIFI networks. Wireless Internet can be found in coffee shops, public libraries, homes and apartments, as well as small branches of banks or insurance companies.
The cybercriminal uses a Raspberry Pi computer with appropriate tools and a WIFI adapter or an ordinary smartphone with open source tools to attack. It uses heavy network traffic to eavesdrop on multiple packets and short passwords, as these are the fastest to crack. C
What dangers lurk when a WIFI network is not secured?
In addition to the already mentioned reading of correspondence, stealing login credentials, there are others that are very serious:
- downloading child pornography and distributing it in
the company’s name, which is punishable in Poland with a prison term of 2-12 years - hacking into networks in order to intercept
access to routers and include them in a botnet. This fact involves DDoS attacks, i.e., a massive attack of many
different computers from all over the world and blocking the IT system - Replacement of DNS addresses used by the router with
created by a hacker, which redirects, for example, to a fake bank site and
hacks sensitive data - distribution of legally protected works. In such
situations, a company can be sued for copyright infringement and struggle
with a lengthy trial in court - identity theft, publication of fascist content,
homophobic or politically motivated attacks.
How to secure WIFI networks?
Several steps need to be applied:
- Secure the WIFI network with WPA or WPA2 encryption, which will block access to private correspondence (at home it can be WPA2-PSK, and in enterprises: WPA2 Enterprise).
- Secure network services. It’s best to send files via encrypted mail rather than an FTP server. It’s essential to remember SSL (HTTPS) protocol, which prevents hacking. You should also consider setting up a guest network with a separate password.
- Change the default names (SSID) and passwords of Wi-Fi networks (it is best to use strong passwords, different for each device. Passwords can be kept in a special tool so you don’t have to remember them all.
- Using a VPN on public networks that encrypts all data transfers and hides the user’s identity on the network.
- Using next-generation routers and limiting the strength of their signals.
- Introduce a proper security policy in the company:
- Conduct training on the dangers of using wireless networks at work and at home.
- Monitor the network, connected devices and Internet traffic.
- Introduce login in the form of two-factor authentication for all users connecting to the wireless network.
Network security at ITH.EU
Network protection, data backup, auditing and monitoring, cloud firewall, VPN, high-speed hosting or SSL certificate – these are only part of our offer. ITH is a provider of telecommunications services for startups, large and small businesses and all kinds of public institutions. We encourage you to use the services of our specialists.