{"id":22743,"date":"2019-06-11T20:41:36","date_gmt":"2019-06-11T09:41:36","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/vulnerable-wi-fi\/22743\/"},"modified":"2019-11-15T22:24:52","modified_gmt":"2019-11-15T11:24:52","slug":"vulnerable-wi-fi","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/vulnerable-wi-fi\/22743\/","title":{"rendered":"Wi-Fi in the office \u2014 convenient but risky"},"content":{"rendered":"<p>Almost every office has a Wi-Fi network today, and sometimes more than one. Who wants to connect laptops with a cable? And forget about smartphones and tablets! However, a wireless network can be a weak point in your IT infrastructure.<\/p>\n<h2>Password mining<\/h2>\n<p>Not all companies use complex and unique passwords for their wireless networks, and few bother to disable the broadcasting of the network\u2019s name. And not many at all limit the power of the WI-Fi signal to prevent network connections from outside of the office. Thus, usually little prevents a potential attacker from hanging around near the office and trying to get into a corporate network through a Wi-Fi connection.<\/p>\n<p>Performing a simple <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/dictionary-attack\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">dictionary attack<\/a> on the router\u2019s login takes just a few seconds. Hacking complex password combinations takes more time, unless the attacker is in a hurry, it is quite possible. However, that\u2019s not always necessary, because with some routers, an attacker can simply use vulnerabilities in the firmware.<\/p>\n<h3>Firmware vulnerabilities<\/h3>\n<p>Researchers regularly detect vulnerabilities that can allow malefactors into a network, bypassing your Wi-Fi router\u2019s passwords and other protective mechanisms. In some cases they can get superuser rights on the device. Usually developers are quick to patch those vulnerabilities. The trouble is that many organizations do not install patches in a timely manner, especially when doing so involves reflashing firmware.<\/p>\n<h2>Guest network<\/h2>\n<p>Many companies use different Wi-Fi networks for employees and guests. This is a reasonable measure: on the one hand, customers and other visitors to the office can connect to the Internet; on the other hand, they will not have access to the corporate network and internal resources. However, guest Wi-Fi can work against you.<\/p>\n<p>Getting a password for a guest network is easy enough \u2014 that\u2019s the idea. But in some cases \u2014 if the network is improperly configured \u2014 it can let guests reach some elements of the corporate infrastructure.<\/p>\n<p>Even with the correct network configuration, your employees can unwittingly put themselves in jeopardy. Suppose that one of them wanted to access a network resource blocked by corporate policy. Without thinking twice, he connects a laptop with confidential data to the guest network. Now an attacker lurking in the same guest network can try to perform a man-in-the-middle attack and infect his laptop with malware.<\/p>\n<h3>How to make corporate malware less vulnerable <\/h3>\n<p>We believe Wi-Fi networks are still worthwhile; they do, however, need security-oriented approaches for both device and corporate-network configuration.<\/p>\n<ul>\n<li>Update the firmware of Wi-Fi routers and access points, and keep them up to date. Manufacturers are constantly fixing vulnerabilities; don\u2019t assume if something works, that means it\u2019s secure.<\/li>\n<li>Set a unique, long, complex password to access Wi-Fi. Your employees will need to enter it only once on each device, and strong passwords make hacking a network more complicated.<\/li>\n<li>Limit signal strength so that your network is not available from outside of the office.<\/li>\n<li>Hide the name of the network to make it harder to find.<\/li>\n<li>Choose a name for the network that is not obvious or easily guessable \u2014 and keep the router model number out of it, so attackers can\u2019t use that to search for a known vulnerability.<\/li>\n<li>Segregate the guest network so guests do not have access to internal resources. You may have to deprive your visitors of some convenience (such as the ability to print a document on your printer), but you will significantly reduce the risk of data leakage.<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com.au\/small-to-medium-business-security?icid=au_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">reliable security solution<\/a> so that even if an attacker breaches your network, they will not be able to cause significant damage to workstations and servers.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Office Wi-Fi may be a weak point in your security.<\/p>\n","protected":false},"author":40,"featured_media":22744,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[3136,640,174],"class_list":{"0":"post-22743","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-guest-networks","10":"tag-vulnerability","11":"tag-wi-fi"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/vulnerable-wi-fi\/22743\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/vulnerable-wi-fi\/15927\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/vulnerable-wi-fi\/13435\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/vulnerable-wi-fi\/17820\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/vulnerable-wi-fi\/15961\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/vulnerable-wi-fi\/14718\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/vulnerable-wi-fi\/18637\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/vulnerable-wi-fi\/17442\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/vulnerable-wi-fi\/22853\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/vulnerable-wi-fi\/6127\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/vulnerable-wi-fi\/27250\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/vulnerable-wi-fi\/11828\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/vulnerable-wi-fi\/11932\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/vulnerable-wi-fi\/10847\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/vulnerable-wi-fi\/19434\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/vulnerable-wi-fi\/23436\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/vulnerable-wi-fi\/22690\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/wi-fi\/","name":"wi-fi"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/22743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=22743"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/22743\/revisions"}],"predecessor-version":[{"id":23793,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/22743\/revisions\/23793"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/22744"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=22743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=22743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=22743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}