The document summarizes the key findings of a wireless vulnerability study conducted across 7 major financial districts. The study found that 57% of wireless networks used insecure encryption methods like open or WEP. It also found client devices vulnerable to attacks from openly connecting to untrusted networks and 13% actively searching for viral hotspots. The conclusions recommend best practices like implementing wireless intrusion prevention and monitoring, strong authentication and encryption, and securing guest access.
7. A Closer Look at OPEN Access Points Page Wireless Vulnerability Management 2008 AirTight Networks, Inc.
8.
9.
10.
11. Practice of SSID Hiding: Security Through Obscurity OPEN APs hiding SSIDs OPEN APs There is continued belief among security administrators that SSID hiding adds security. Majority of OPEN APs with hidden SSID are Enterprise grade! So What? Observations about detected APs
12. A Closer Look at WEP Access Points Page Wireless Vulnerability Management 2008 AirTight Networks, Inc.
21. Five Steps to Protect Against WiFi Security Breaches Use a Wireless Intrusion Prevention System (WIPS): Prevent leakage of sensitive data and protect your network from wireless security threats with 24/7 wireless monitoring Follow endpoint wireless security best practices : Promote WiFi security best practices among laptop users. Using wireless security endpoint security agent, enforce your enterprise policies seamlessly across all laptops and secure them even when they are away. Conduct wireless security audits and scans : Periodically conduct wireless scans to detect presence of unauthorized WiFi devices and activity in your premises. Monitor guest WiFi access : Authenticate guest users and monitor unauthorized access when providing guest access over WiFi networks Use strong authentication and encryption : Use the best standards for authentication and encryption (e.g., WPA/WPA2) when deploying WiFi networks WiFi not deployed WiFi deployed Recommended Best Practice