Feeds

WLAN security still dismal – survey

London Calling

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

The security of London's wireless networks remains pitifully slack.

The second annual survey of WLAN security revealed the number of wireless networks deployed in businesses across London has grown 300 per cent in the past year.

However the increased popularity of wireless networks hasn't been matched by realisation of the importance of extending proper security policies to WLANs.

The RSA- commissioned survey suggests that London businesses are becoming even more vulnerable to malicious hacking because of slack WLAN security. Possible risks include:

  • Computer eavesdropping on company secrets
  • Network disruption
  • Launching denial of service attacks using the cover of the unsuspecting company,

With a hand-held scanner, researchers were able to pick up information from company wireless networks by simply driving around the streets of London. The research identified that 63 per cent of the networks surveyed were left on default configuration, which clearly identifying the company owning the data and where it was coming from.

The overall security picture has barely changed from last year when, using the same methodology, researchers found 67 percent of London companies surveyed left their wireless networks poorly secured against potential attack.

Tim Pickard, strategic marketing director, RSA Security says: "We have seen a proliferation of the use of wireless networks around London, but the steps taken to secure these networks are still woefully inadequate."

"The research shows that many organisations are now at least encrypting their company data by securing wireless networks with virtual private networks but the problem has shifted to other areas."

Among the problems highlighted by the survey are:

  • Failure to effectively encrypt data travelling across wireless networks.
  • Equipment left in default configurations.
  • Insufficiently secured wireless network access points, potentially allowing crackers to set up rogue access points to capture company information.
  • Failure to secure data on wireless enabled laptops.

Independent security consultant Phil Cracknell, who wrote the report, comments: "Researchers stuck to the strict letter of the law in carrying out this survey and did not access any specific data but others clearly may not.



"Hackers could easily use this access to conduct cyber crime or to launch hacking attacks on other companies with complete anonymity."®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.