• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Do You Trust Your Home Wi-Fi?

May 8, 2020 By Milena Babayev

We’ve been talking a lot lately on how crucial it is for organizations to enable a Trusted Wireless Environment. Now that working remotely is our “new normal,” and not every company is able to send an AP225W wall plate access point home with everyone, we covered 5 tips that would keep remote workers safe and Wi-Fi hackers away in a previous blog, but here’s a refresher:

  1. Connect to your company’s network via VPN (virtual private network).
  2. Change the SSID (service set identifier) in your home cable model or router to ‘hide’ to keep Wi-Fi hackers away.
  3. Use a WPA2-, or if you can, WPA3-protected modem/router.
  4. Change the password to your Wi-Fi network frequently. Don’t use the default settings.
  5. Create a guest network for people in your household, so that they can connect to it without getting access to your company’s network.

Although these Wi-Fi tips will keep you and your loved ones safe, they won’t always protect you against the six known Wi-Fi threat categories.

  • Rogue Access Point: Allows attackers to bypass perimeter security.
  • Rogue Client: Delivers malware payloads to the network after connecting to malicious APs.
  • Neighbor Access Point or Client Misassociation: Risks infection from connecting to other SSIDs while in range of the authorized AP.
  • Ad-Hoc Network: Uses peer-to-peer connections to evade security controls and risk exposure to malware.
  • “Evil Twin” Access Point: Lures users to connect to it so as to spy on traffic, steal data and infect systems.
  • Misconfigured Access Point: Opens networks to attack as a result of configuration errors.

All these threats are not new and have been around since Wi-Fi went mainstream 21 years ago. But one thing that has remained the same and is so shocking to me – there are no security standards around Layer 2 Wi-Fi to keep Wi-Fi users like you and me safe. This is why I’m advocating for change. We all deserve to connect to Wi-Fi we can trust. I want to be able to connect to Wi-Fi at home or in my favorite coffee shop and not have to look around wondering if the person sitting next to me on their laptop is a hacker. Hackers prefer to go after Wi-Fi because it’s the weak link in the security chain and it doesn’t take much to hack into a Wi-Fi network.

So, what can we do today to help build the future of a secure Wi-Fi standard across the world? Everyone can join the Trusted Wireless Environment movement and advocate for global security standard for Wi-Fi. Visit www.TrustedWirelessEnvironment.com today! Every signature we collect will help us partner with organizations such as the Congressional Wi-Fi Caucus, WiFiForward, PCI Security Standards Council, Wi-FiNOW, IEEE, and Wi-Fi Alliance to name a few. These organizations help build security standards for businesses around the world and we want to join forces by collaborating with them to make this world a safer place.

Stay safe, everyone!

#TrustYourWiFi

Share This:

Related

Filed Under: Editorial Articles Tagged With: remote employee, Remote Wi-Fi, remote work, remote workforce, secure wi-fi, trusted wireless environment, twe, wi-fi security

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Malvertising, Ransomware, and Alleged IRS Breach
  • Law Enforcement Infiltrate and Seize Hive Ransomware Operation
  • The RCE Vulnerability That Wasn’t
  • Cybersecurity News: ACLU Unveils Mass Surveillance Program, (More) Malvertising, and Breaches

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • CISA Warns of Weaponized RMM Software
  • Cybersecurity News: ACLU Unveils Mass Surveillance Program, (More) Malvertising, and Breaches
  • Law Enforcement Infiltrate and Seize Hive Ransomware Operation
  • Report Roundup
  • Cybersecurity News: Malvertising, Ransomware, and Alleged IRS Breach
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use