February 15, 2018 By David Bisson 2 min read

A new survey revealed that 92 percent of IT professionals are concerned about Wi-Fi security risks related to accessing public networks on corporate devices.

According to a Spiceworks, most IT professionals believe organizations could do more to address these risks. Just 63 percent of respondents said they are confident that employees use a virtual private network (VPN) when accessing public Wi-Fi on a corporate device, and even fewer (55 percent) said they think organizations are protected against these threats overall.

IoT Sparks Wi-Fi Security Concerns

Their concerns are justified: Twelve percent of respondents said their organization has suffered a security incident that involved an employee connecting to public Wi-Fi. Even more troubling is the fact 34 percent of IT professionals don’t know whether their employer has experienced such an incident due to the difficulty of detecting these events.

But IT professionals aren’t just concerned about public Wi-Fi — they’re also worried about the security of devices that are connecting to corporate networks. Respondents to the Spiceworks survey attributed the greatest risk of Wi-Fi attacks to Internet of Things (IoT) devices, such as IP-enabled controllers (52 percent), appliances (49 percent), video equipment (42 percent) and electronic peripherals (40 percent). By contrast, 32 percent ranked Windows laptops as the greatest risk, while 18 percent cited iOS smartphones.

“While adoption of IoT devices is increasing in the workplace, many IT professionals are still wary of connecting these often unpatchable devices to corporate Wi-Fi networks,” said Peter Tsai, senior technology analyst at Spiceworks, in a press release. “As a result, some organizations are delaying the adoption of IoT devices and holding out hope that the forthcoming WPA3 protocol might improve Wi-Fi security.”

Don’t Wait for WPA3

But organizations don’t have to wait for WPA3 to begin addressing the persistent challenges associated with Wi-Fi security. In the meantime, they can use standard Wi-Fi security protocols and create guest Wi-Fi networks for visitors. If they haven’t done so already, they can also set up complex admin passwords on networking devices, implement strong service set identifier (SSID) networking names and enact MAC address filtering.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today