In the past year, IT admins and consumers have witnessed some pretty brutal cyber attacks. From new vulnerabilities in protocols to outdated devices and software, IT admins have been especially hard-pressed to increase security in their environments. Securing devices in response to cyber attacks on WiFi networks is a security requirement that IT admins can’t afford to ignore.
When the KRACK attack occurred in October 2017, we put together a security briefing where we discuss a list of five things you can do to improve your WiFi security, and using secure devices is at the top of the list. Our advice about using secure devices doesn’t just pertain to KRACK though, and is good advice to heed in general for network security – especially when new cyber attacks are surfacing routinely.
Using KRACK as an example, this post, covers how to secure devices in response to cyber attacks. If you are interested in the comprehensive KRACK security briefing and the 5 steps you can take to improve WiFi security, feel free to check out the blog post here and watch the video here. In them, we discuss taking these 5 steps:
- Use patched, secure devices
- Avoid public WiFi
- Browse securely (https)
- Leverage existing VPNs
- Implement RADIUS
Now let’s quickly review what KRACK is, and then we’ll discuss steps you can take to secure your devices in response to cyber attacks like KRACK.
KRACK Cyber Attack Overview
The Key Reinstallation Attack (KRACK) allows an attacker to take advantage of vulnerabilities within the WPA2 protocol and gain the ability to read information that is supposed to be encrypted, like credit card numbers and passwords. The interesting aspect of this attack is that it has nothing to do with how a user accesses or authenticates to a network. Instead, this attack compromises the protocol that encrypts information passed through the network. So, if you unknowingly are using a KRACKED network and use a WiFi enabled device to purchase something or log in into an account, the attacker can read your credit card information or the username and password to whatever account you (Read more...)
*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Natalie Bluhm. Read the original post at: https://jumpcloud.com/blog/secure-devices-response-wifi-cyber-attacks/