Security Briefing: 5 Ways to Improve WiFi Security in Response to KRACK

In this security briefing, JumpCloud’s Chief Product Officer Greg Keller speaks with Senior Success Engineer Scott Reed about the KRACK vulnerabilities in the WPA2 protocol. Watch the video above to learn 5 ways to improve your WiFi security in response to KRACK.

If you have any questions for us, you can reach out to a member of our team directly via our contact page.

The 5 Ways to Improve Your WiFi Security

  1. Patched, Secure Devices
  2. Avoid Public WiFi
  3. Browse Wisely (https)
  4. Leverage Existing VPNs
  5. Implement RADIUS

Security is an always-changing landscape and this is not a comprehensive list. Still, it’s a very good start to improving your network security posture and preventing your IT organization from falling victim to the Key Re-installation AttaCK (KRACK). You can read more about these five steps in an accompanying blog post on auditing your WiFi security posture in the wake of KRACK.

KRACK Resources

“An IT Admin’s job is to protect the company from their blindspots.”
– Scott Reed

Scott and Greg mention a couple of resources where you can find up-to-date information on patches for the KRACK vulnerability from vendors. We’ve included the links here for easy access. Note that JumpCloud does not endorse either of these resources and can not guarantee the credibility of the information to be found on these sites.

Reddit KRACK Link: https://www.reddit.com/r/KRaCK/
GitHub KRACK Link: https://github.com/kristate/krackinfo

Get Started and Learn more about JumpCloud

More info on JumpCloud’s cloud RADIUS service can be found on this page. The music for this security briefing is brought to you by It Me Music.

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

This is a Security Bloggers Network syndicated blog post authored by Jon Griffin. Read the original post at: JumpCloud

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 131 posts and counting.See all posts by jon-griffin