Five Common Wi-Fi Attacks and How to Prevent or Fix Them

shutterstock_130687829Any business with an online presence, or that uses Wi-Fi within their organization, needs to be aware of attacks. Fortunately, while there are some sophisticated attacks that any business can fall victim to, there are also a number that can be easily fixed or defended against. The five most common attacks, and methods of intrusions, are:

  • Denial of Service (DoS) attacks
  • Guests on your network
  • Lost devices
  • Rogue access points
  • Session hijacking

DoS Attacks

Most people who use the internet have heard of DoS, or Denial of Service, attacks. Because access points use vulnerable radio waves, a successful DoS attack can easily cause a business’ Wi-Fi network to become slow and inconsistent, or even go down completely. The best defense for an attack such as this is to use an Intrusion Prevention System (IPS) tool, which will monitor the network to detect and defend against incoming attacks.

There is also a more innocent version of a DoS attack that usually isn’t initiated by a hacker: wireless signal overlap with a nearby network. This can easily be fixed by checking, then adjusting Wi-Fi-enabled equipment to reduce or eliminate signal conflicts.

Network Guests

Authorized users can sometimes be the source of network insecurity. Businesses may not always know which users are accessing information. There is a solution however a security protocol known as WPA2, or Wi-Fi Protected Access II. Using the Pre-shared Key (PSK) mode to encrypt wireless traffic will prevent all but the most technologically knowledgeable from accessing company data.

Lost Devices

Changing passwords regularly is always important to security, but never more so than when a device is lost or stolen. As soon as the loss is noticed or reported, passwords to all general equipment, access points, and routers should be changed. WPA2 can be useful here as well, using the enterprise mode and a RADIUS server to authenticate users.

Rogue Access Points

A business’ IT professionals can usually help when finding rogue access points – if only because IT professionals were often the first to create them for their own access. Using software, such as apps that detect and prevent intrusion, will cut down on the number of rogue access points. There’s also another very easy solution, labelling wall jacks and Ethernet ports. This will enable IT to see which ports are in use. If a port found being used should not be, IT knows they have a possible rogue access point.

Session Hijacking

While common, session hijacking is somewhat more sophisticated than the rest of the list. Session hijacking comes from the end-user, who may be visiting many different websites and unfortunately may pick up a problem that they aren’t aware of. Fortunately, like other solutions, this kind of attack can be prevented by the use of protocols such as WPA2, WPA PSK mode, or Wired Equivalent Privacy (WEP).

An IT department that does its due diligence may be all that a business needs to protect itself against Wi-Fi attacks. However, it doesn’t hurt to know a few easy solutions to common attacks, or to make sure the business network is as secure as possible. With security measures in place, such as the use of WEP, WPA, WPA2, and specific software, as well as monitoring the network and changing passwords, a business can keep their sensitive data safe.

Telcos, Mobility, and Big Data: Using the IoT as a Value-Added Service

shutterstock_234153883Many businesses are learning the value of big data and mobility for improving business efficiency and customer experience. However, not much has been said about how to monetize data itself, not simply to enhance sales, but as a value-added service offering.

With the increase in smartphone users, who often use a number of apps to browse the internet, mobile network providers now have access to a large amount of data. The data reveals much about the mobile network provider’s customers, including:

  • Customer preferences
  • Smartphone application usage
  • Customer locations
  • Items and services customers may be looking for

As mobile and Internet of Things (IoT) devices increasingly allow customers to look up information no matter where they are, more and more data is generated. Telecom companies, many of whom maintain a mentality of network services exclusively, may not realize that the data already being collected and stored for use in improving a Telco’s services, can be useful to third-party partners.

Search engines and social media platforms are currently using collected data to personalize advertisements to their users. Using the same techniques, telcos can easily do this as well, a strategy that would benefit both telcos and their partners. This can then lead to the ability to provide the full management of their partners’ IoT or Mobile to Mobile (M2M) requirements.

Every machine that connects to the internet will need a method of collection, processing, and storage of data. This is a list that can include not only smartphones, but also:

  • Home appliances
  • Wearable devices, such as smart watches
  • Smart meters
  • Apps
  • Home management systems

Telcos can even sell this service to new businesses who are just entering the IoT field, or sell the systems that will allow the new business to monetize their traffic on their own. While the initial investment in business and data systems may seem high, telcos may find that it pays off in the future, especially as the IoT continues to grow and expand.

While low-cost connectivity may be important to customers, it also isn’t likely to generate high revenues. By also offering value-added services that harness the mobility and power of the IoT, telcos will continue to maintain their competitive edge. Some telcos are already beginning to do this by teaming up with:

  • Fleet management, which uses location data
  • Medical monitoring
  • Connected car services
  • Energy utilities

In the future telcos may also need to partner up with competitors, to expand the telco’s regional coverage. This will help to bring in the international market, which is currently struggling with having to work with multiple companies in multiple different markets.

By harnessing the mobility of the IoT, and data already being generated by smart device users, telcos can continue to grow and expand their business.