Today the Wall Street Journal reported that the Hartsfield-Jackson Atlanta International Airport shut off Wi-Fi service as a security precaution while an active ransomware attack took place on the city. Early reports are indicating that multiple city official computers have had their files encrypted and held at ransom by an attack known as SamSam. The Atlanta airport had … [Read more...]
Wi-Fi Hacking at the Hotel Pool
While making breakfast for our kids this morning, my wife sent me a few second video of the Today Show with the message “I think I know what you do for work now” with a smiley emoji. In the segment, host Jeff Rossen gives his audience a warning around using public Wi-Fi this spring break and tips to keep themselves safe. Rossen goes onsite to the pool at a hotel resort, … [Read more...]
IoT Devices: Fast, Cheap or Secure…Pick Two
The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. As a matter of fact, Bain estimate that by 2020 annual IoT revenues will reach $470 Billion, and McKenzie & Company predicts the annual growth rate of IoT devices to be about 33 percent. Unfortunately, this fast-paced growth comes at a price – a lack of IoT … [Read more...]
How to Eliminate These 5 Critical Wi-Fi Mistakes
If you own a business, you probably know that delivering dependable Wi-Fi is an essential service for customers, especially considering most people carry at least one Wi-Fi enabled device at all times. But, if security parameters are not set and networks are not properly monitored, you could be exposing your business and your customers to a variety of security … [Read more...]
Why Automation and Classification are the Keys to Defending Your Airspace
How can an organization protect its employees and customers from Wi-Fi attacks such as Karma or man-in-the-middle (MiTM)? The convenience of public Wi-Fi drives people to connect to it in droves, but hackers can take advantage of the lax security practices of most public hotspots to steal people’s information. How can we stop these attacks before they happen? In a … [Read more...]