<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>wi-fi safety Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/wi-fi-safety/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/wi-fi-safety/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Mon, 25 Mar 2024 00:53:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>wi-fi safety Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/wi-fi-safety/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Outsmarting the Invisible Threat: How Cyber Attackers Hijack Your Wi-Fi Connections and How to Protect Yourself</title>
		<link>https://fosterinstitute.com/outsmarting-the-invisible-threat-how-cyber-attackers-hijack-your-wi-fi-connections/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sat, 23 Mar 2024 20:06:07 +0000</pubDate>
				<category><![CDATA[Airport Safety]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[laptops]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[wi-fi security]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5743</guid>

					<description><![CDATA[<p>Wi-Fi is a fundamental part of our digital lives, whether it&#8217;s in your office, favorite coffee shop, or hotel. However, there&#8217;s a hidden peril in this convenience of automatically connecting to networks remembered on your devices. Let’s dive into why this feature, though helpful, can be a gateway for cyber threats. As a chief executive, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/outsmarting-the-invisible-threat-how-cyber-attackers-hijack-your-wi-fi-connections/">Outsmarting the Invisible Threat: How Cyber Attackers Hijack Your Wi-Fi Connections and How to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-preserver-spaces="true">Wi-Fi is a fundamental part of our digital lives, whether it&#8217;s in your office, favorite coffee shop, or hotel. However, there&#8217;s a hidden peril in this convenience of automatically connecting to networks remembered on your devices. Let’s dive into why this feature, though helpful, can be a gateway for cyber threats. As a chief executive, business owner, or top-level executive, you&#8217;re likely familiar with the convenience of connecting your devices to Wi-Fi networks once, and if you allow your device to &#8220;remember&#8221; the network names, your device can automatically reconnect to any networks with those names from then on. </span></p>
<h3><span data-preserver-spaces="true">The Risk: When Convenience Becomes a Liability</span></h3>
<p><span data-preserver-spaces="true">Imagine this: You&#8217;ve visited a coffee shop and connected your smartphone to their Wi-Fi network. Your device remembers this network to connect automatically next time. Seems harmless, right? Here&#8217;s where the risk creeps in.</span></p>
<p>Once you tell a device to automatically reconnect to a remembered network in range, your device will continuously send out &#8220;probes&#8221; or signals looking for that network, typically one to four times a minute and more often when other events can trigger a probe. A threat actor can set up a Wi-Fi access point with a common SSID name, such as &#8220;home.&#8221; And what if your device is configured to automatically connect to a network you trust named &#8220;home?&#8221; When your device, say your smartphone or laptop, is within range, it might automatically connect to this rogue Wi-Fi network without your knowledge.</p>
<h3><span data-preserver-spaces="true">The Trap: A Deceptive Doppelgänger</span></h3>
<p><span data-preserver-spaces="true">This rogue network, set up by the threat actor, is a doppelgänger of your trusted network but with nefarious purposes.</span></p>
<p><span data-preserver-spaces="true">Remember: Your device connects to the rogue access point <em>automatically</em> and often <em>without alerting you at all.</em> (see &#8220;what about passwords&#8221; below). This attack does not need you to make any mistakes to succeed, and it can happen without your knowledge.</span></p>
<p><span data-preserver-spaces="true">Ten common network names threat actors can use that will often lure devices from unsuspecting users to connect include:</span></p>
<ul>
<li><span data-preserver-spaces="true">xfinitywifi</span></li>
<li><span data-preserver-spaces="true">linksys</span></li>
<li><span data-preserver-spaces="true">Marriott_Guest</span></li>
<li><span data-preserver-spaces="true">Hyatt</span></li>
<li><span data-preserver-spaces="true">hhonors</span></li>
<li><span data-preserver-spaces="true">NETGEAR</span></li>
<li><span data-preserver-spaces="true">Guest</span></li>
<li><span data-preserver-spaces="true">dlink</span></li>
<li><span data-preserver-spaces="true">FreeWifi</span></li>
<li><span data-preserver-spaces="true">Home</span></li>
</ul>
<p><span data-preserver-spaces="true">To make it even easier to connect, there are commercially available devices that listen for the SSID name in a probe from an unsuspecting user&#8217;s device and then broadcast that name in an effort to capture the device&#8217;s connection. In that case, it doesn&#8217;t matter how unique your SSID is, an automated device can attempt to establish a connection without your knowledge. </span><span data-preserver-spaces="true">If you are technically minded, you can read the section at the bottom of this article for a detailed explanation of how probing works.</span></p>
<p><span data-preserver-spaces="true">Once connected, the attacker can intercept your device&#8217;s data. This interception could be called a “Man-in-the-Middle” attack. Thanks to encryption technology, the attacks are more complicated than they used to be, but they are still possible in some circumstances. If the attacker successfully establishes the Man-in-the-Middle connection, imagine sending confidential emails, accessing your company’s financial data, or even logging into your personal banking app, all while an unseen cybercriminal is potentially recording every keystroke and data transfer.</span></p>
<p><span data-preserver-spaces="true">Another serious concern is if threat actors know of undiscovered vulnerabilities that will allow them to hack into your device. This is one of the most important reasons to always apply security updates when they are released and always keep backups for the unlikely scenario of an update causing a problem on your device. Even if you applied all of your security updates, sometimes attackers know of ways to break in that haven&#8217;t been discovered by the device&#8217;s manufacturer, operating system producer, or app developer yet. Thus, there are no updates written. Bad actors can use tools to scan your device and exploit vulnerabilities quickly. Their ultimate goal would be to take control of, or pwn, your device. This isn&#8217;t always easy if you have all your updates in place, but it isn&#8217;t impossible either.</span></p>
<h3><span data-preserver-spaces="true">The Consequences: A Digital Pandora&#8217;s Box</span></h3>
<p><span data-preserver-spaces="true">The consequences from attackers successfully tricking your device into connecting to their rogue access point and exploiting vulnerabilities can range from private information exposure to significant breaches:</span></p>
<ol>
<li><strong><span data-preserver-spaces="true">Personal Data Theft</span></strong><span data-preserver-spaces="true">: Sensitive personal information can be stolen.</span></li>
<li><strong><span data-preserver-spaces="true">Corporate Espionage</span></strong><span data-preserver-spaces="true">: Confidential business information could be compromised.</span></li>
<li><strong><span data-preserver-spaces="true">Identity Theft</span></strong><span data-preserver-spaces="true">: Your digital identity could be used for fraudulent activities.</span></li>
<li><strong><span data-preserver-spaces="true">Network Infiltration</span></strong><span data-preserver-spaces="true">: Once a device is compromised, it can serve as a gateway to your business’s entire network.</span></li>
</ol>
<h3><span data-preserver-spaces="true">Prevention: Turning Awareness into Action</span></h3>
<p><span data-preserver-spaces="true">As executives, instructing your workers to implement security measures is crucial. Here are some actionable steps you can take in the Wi-Fi settings of your laptops, phones, and tablets:</span></p>
<ol>
<li><strong><span data-preserver-spaces="true">Forget Networks</span></strong><span data-preserver-spaces="true">: In your device&#8217;s Wi-Fi settings, examine the network names identified as &#8220;remembered&#8221; or &#8220;my networks.&#8221; Tell your device to ‘forget’ networks by removing them from the &#8216;my networks&#8217; list, except those you use frequently. Were any of the ten listed above remembered on your device? To establish the unauthorized connection, the threat actor would need to use the name of one of the networks you leave remembered or use the device mentioned above that responds to probes for names your device sends.</span></li>
<li><strong><span data-preserver-spaces="true">Avoid a False Sense of Security</span></strong><span data-preserver-spaces="true">: If your device has the &#8220;Ask to Join Networks&#8221; setting, read the fine print. The device will still join known network names without asking. The setting is usually more about asking before joining new or unknown networks, rather than known ones.</span></li>
<li><strong><span data-preserver-spaces="true">Turn off Wi-Fi When You Aren&#8217;t Using it</span></strong><span data-preserver-spaces="true">: To reduce your exposure dramatically, disable Wi-Fi when you are not using it. Your device will stop probing, stop listening for access points broadcasting their name, and won&#8217;t connect to any Wi-Fi networks. Some devices have a quick shortcut to turn off Wi-Fi from an easily accessible menu, but they might turn Wi-Fi back on again after a while or when you move to a new location. On those devices, if you go into &#8220;Settings&#8221; to disable Wi-Fi, it should stay off until you manually change the setting to &#8220;on&#8221; again.</span></li>
</ol>
<h3><span data-preserver-spaces="true">What about Wireless Passwords?</span></h3>
<p><span data-preserver-spaces="true">If the original remembered network you connected to, such as the coffee shop network, had no password, your device would join the network automatically and not alert you. This is a common risk with some remembered networks. You may have noticed that many hotels and some coffee shops and restaurants now require no Wi-Fi password; this is undoubtedly to reduce guest frustration and the number of calls from hotel rooms to the front desk asking for the password. The prevalence of public networks without passwords makes it especially important for you to tell your device to forget networks and be sure to forget the ones with no passwords. </span></p>
<p><span data-preserver-spaces="true">However, if the &#8220;remembered&#8221; network did have a password, then to get your device to connect automatically without warning you, the threat actor will need to set the same password on the rogue access point. It is simple for an attacker to know the password for coffee shops and other networks that share the password with guests. </span></p>
<p><span data-preserver-spaces="true">Many companies will set passwords on networks and hopefully don&#8217;t write the password on dry-erase boards in the meeting room. Even if the passwords are configured at the company, and users do not know the password since the IT Professionals configure their computers, if an attacker is able to access one computer, in-person or remotely, there is a chance they can run a script to find out the wireless password for the company. This is why some companies use enterprise-level Wi-Fi authentication that does not rely on a shared password.  Or, attackers can use social engineering to successfully trick a user into providing the network password. If a user&#8217;s device doesn&#8217;t detect any anomalies between the rogue access point and the access point it is used to connecting to, the user will not be alerted they are connecting to a rogue access point, and their device will connect automatically.<br />
</span></p>
<p><span data-preserver-spaces="true">An exception that might generate an alert is when there is a discrepancy between the security settings of the known network and the one to which the device is trying to connect. An example is when the rogue access point does not have a password, but the remembered network does. In this case, some devices will prompt you: &#8220;Are you sure you want to join this network?&#8221; The default button, &#8220;join,&#8221; is preselected. Unless you are on the lookout for this kind of message and know the seriousness, you might click &#8220;join&#8221; and not think anything of it. Sometimes, the device will connect and not alert the user but will quietly list the word “open” or “insecure” under the network name on the list of networks under settings. Most people do not periodically look at the Wi-Fi settings, so the label often goes unnoticed. Even if a user does notice the label, there is a good chance the attacker already probed for weaknesses and exploited any vulnerabilities they discovered.</span></p>
<p>However, if you ever see a prompt asking you to re-enter a password, that is a huge red flag, and you need to assess the situation carefully to determine if your device is attempting to connect to a rogue access point with an inaccurate password.</p>
<p><span data-preserver-spaces="true">And to be sure you don’t have a false sense of security, remember that devices do not prompt the user if the security settings of the new network match those of the remembered network, and the device will quietly automatically connect even if it’s a rogue access point.</span></p>
<h3><span data-preserver-spaces="true">What about a VPN?</span></h3>
<p>A Virtual Private Network (VPN) is a technology that encrypts data as it moves to and from your device. This encryption can prevent attackers from reading your data. However, it&#8217;s important to note that a VPN doesn&#8217;t protect you from attackers who scan for unpatched vulnerabilities, search for open ports, and exploit weaknesses on your device. Even if you use a VPN, you&#8217;re still vulnerable to such attacks. Follow the instructions above to help ensure your online safety.</p>
<h3><span data-preserver-spaces="true">Final Thoughts: Balancing Convenience with Caution</span></h3>
<p><span data-preserver-spaces="true">In today&#8217;s fast-paced digital world, convenience often beats caution. However, in the realm of cybersecurity, this trade-off can have dire consequences. As leaders, our role extends beyond making decisions; it includes understanding and mitigating the risks associated with the technology we use every day. Stay safe, stay informed, and lead your organization confidently in this digital age.</span></p>
<h3><span data-preserver-spaces="true">Technical Details About the Probing Process</span></h3>
<p>For the more technically minded, here is more information about the probing process. When we say that devices are constantly probing, they are, and the probing might be once every 15 to 60 seconds. The probing frequency can vary, for example, if you put your device in low battery mode.</p>
<p>In addition to devices probing, know that Wi-Fi access points, including rogue access points attackers use, broadcast their network name, a process called beaconing, sometimes as often as ten times every second. The rate of beaconing is usually configurable by your IT Professionals.</p>
<p>If you look at “available networks” in &#8220;settings&#8221; on your device, you might notice that the list takes a few seconds to build because your device is cycling through multiple Wi-Fi frequencies, listening for the beacons.</p>
<p>An interesting setting not everyone is familiar with on wireless access points is that you can instruct the access point to be “hidden.” If you do, then the access point will not send out beacons. However, hidden networks, while not broadcasting their SSID, will still respond to direct probes that contain their SSID name. So, as soon as your device sends out a probe looking for the remembered hidden network, which it does regularly, as described above, the access point will respond, and your device will connect. Just because a network you “remembered” is hidden at your home or office doesn’t affect a threat actor’s ability to lure your device into connecting to their rogue access point, even if the hacker’s access point is not hidden.</p>
<p>Additionally, to reduce the delay in connecting, your device will send immediate probes in certain circumstances, such as when it wakes from sleep, when you open your laptop&#8217;s lid, or if you just disabled airplane mode. Your device will quickly find access points, even rogue ones, especially if they are &#8220;remembered.&#8221;</p>
<p>A significant benefit to attackers of your device probing periodically, such as every 15 to 60 seconds, is when the attacker doesn&#8217;t already know the network names your device has remembered. The attacker tools wait for the probe, then know the name, and the rogue access point automatically claims to have that network’s name. This is a very powerful way for attackers to capture as many unsuspecting users as possible without needing to predict the names of remembered networks.</p>
<p>&nbsp;</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6>Disclaimer: The information provided in this blog is for general informational purposes only. Technology changes constantly, and some of this information might become obsolete or incorrect. We do not endorse or receive compensation for mentioning products, services, or brand names. Any outbound links provided are for your convenience and to get you started, but we cannot guarantee the security or safety of those external websites. Conducting your research and making an informed decision about any products or services mentioned here is essential. We shall not be held responsible for any actions taken based on the information provided.</h6>
<p>The post <a href="https://fosterinstitute.com/outsmarting-the-invisible-threat-how-cyber-attackers-hijack-your-wi-fi-connections/">Outsmarting the Invisible Threat: How Cyber Attackers Hijack Your Wi-Fi Connections and How to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6</title>
		<link>https://fosterinstitute.com/when-you-buy-new-wi-fi-devices-be-sure-they-support-wi-fi-version-6/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 18 Jun 2019 15:39:45 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[wi-fi best practices]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[wi-fi security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security assessment]]></category>
		<category><![CDATA[cybersecuirty awareness training]]></category>
		<category><![CDATA[cybersecurity consultant]]></category>
		<category><![CDATA[it audit]]></category>
		<category><![CDATA[IT review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2973</guid>

					<description><![CDATA[<p>Wi-Fi technology is always changing. When you buy new Wi-Fi equipment, be sure to ask if there is a Wi-Fi version 6 option available. You will increase speed, security, and help futureproof your investment. Wi-Fi version 6 will become the new standard for several reasons: Faster: Wi-Fi version 6 won’t necessarily speed up your network [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/when-you-buy-new-wi-fi-devices-be-sure-they-support-wi-fi-version-6/">When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Wi-Fi technology is always changing. When you buy new Wi-Fi equipment, be sure to ask if there is a Wi-Fi version 6 option available. You will increase speed, security, and help futureproof your investment. Wi-Fi version 6 will become the new standard for several reasons:<span id="more-2973"></span></p>
<p>Faster: Wi-Fi version 6 won’t necessarily speed up your network if you have few wireless devices because it only offers faster speeds when multiple wireless phones, computers, appliances, and other devices connect to the access point. Up to 8 devices can communicate simultaneously with the access points, twice as many as before. The new technology even makes mobile device batteries last longer because Wi-Fi v6 can permit devices to draw less power.</p>
<p>More Secure: The primary security-related feature is mandating a security technology called WPA3. The prior version, WPA2, is more than ten years old and vulnerable to remote password guessing attacks. WPA3 requires an attacker to stay physically close to a network when guessing passwords, and your devices can detect frequent guesses. WPA3 encryption is optional in Wi-Fi v5 but required with Wi-Fi version 6.</p>
<p>Futureproofing and Interoperability: When you buy new devices, they may be so expensive that you don’t replace them for years. The good news is that your old Wi-Fi version 5 devices can work with your new access points, and vice versa, so you don’t need to replace everything immediately. However, over time, replace both to experience all of the benefits of version 6.</p>
<p>Nomenclature: You may have noticed that the Wi-Fi Alliance is ditching the old way of naming wireless technology like 802.11b, 802.11a, etc. Now, they are moving to increase version numbers, starting with Wi-Fi v6. The next version will be v7, then v8, and so on.</p>
<p>Please forward this message to people you know who are buying new Wi-Fi devices so they can seek Wi-Fi v6 certified devices when available. They’ll help futureproof their investment, increase security, and enjoy faster connections in busy environments.</p>
<p>The post <a href="https://fosterinstitute.com/when-you-buy-new-wi-fi-devices-be-sure-they-support-wi-fi-version-6/">When You Buy New Wi-Fi devices, be Sure they Support Wi-Fi Version 6</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Wireless Security is Broken &#038; What You Need to Do</title>
		<link>https://fosterinstitute.com/wireless-security-is-broken-what-you-need-to-do/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 17 Oct 2017 13:33:29 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[KRACK]]></category>
		<category><![CDATA[wi-fi best practices]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[wi-fi security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[firmware updates]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Microsoft patch]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Patches]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Wi-fi security]]></category>
		<category><![CDATA[wireless network]]></category>
		<category><![CDATA[WPA2]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2558</guid>

					<description><![CDATA[<p>Many organizations rely on a wireless password to protect their Wi-Fi networks. Behind the scenes, that password is used as part of a security protocol called WPA2. An attack, dubbed KRACK, has been announced that breaks that security. The attack can permit attackers to potentially eavesdrop on your network traffic and your communications, change information, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/wireless-security-is-broken-what-you-need-to-do/">Wireless Security is Broken &#038; What You Need to Do</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many organizations rely on a wireless password to protect their Wi-Fi networks. Behind the scenes, that password is used as part of a security protocol called WPA2. An attack, dubbed KRACK, has been announced that breaks that security.<span id="more-2558"></span></p>
<p>The attack can permit attackers to potentially eavesdrop on your network traffic and your communications, change information, delete information, and insert information, all to cause problems and cost you money.</p>
<p>The good news is that the attacker needs to be within range of your Wi-Fi network. They could be some distance away if they use a strong antenna or if they plant a remotely controlled device nearby.</p>
<p>Do two things to mitigate this danger:</p>
<p>First: Apply the new patches that address this issue. That can prevent the attack.</p>
<p>Second: Isolate your wireless network from the rest of your network. That can help reduce the damage.</p>
<p>Related to the first step: Apply the most recent critical security patches, often called firmware updates, to your wireless devices. The company brands of your devices should release patches. Additionally, apply patches to your operating systems and applications that use Wi-Fi networking.</p>
<p>Microsoft released a patch a few days ago, on October 10, as part of the expected second Tuesday of every month patches, that solves this problem on their side of the products. At home, your automatic update should have patched your Windows workstations. But you will still need to patch your wireless access point. At the office, your IT team will need to patch the computers and devices. Please give them time to do so – it can take some time. Information about the attack in general, and some of the patches, can be found at: <a href="http://kb.cert.org/vuls/id/228519">kb.cert.org/vuls/id/228519</a> If the manufacturer of your devices does not produce updates, your next step might be to replace the devices with new ones.</p>
<p>For the second step: It is an IT Security best practice to isolate all wireless devices on your network to be away from the wired devices. For years, organizations would add wireless capabilities to their network by connecting wireless access points to the same network as your workstations and servers. That is a very dangerous practice since it can permit wireless devices, perhaps belonging to an attacker in the van outside your building, to access the wired resources on your network. In the case of this specific attack, it makes it easier for the attacker to access the data on the most protected parts of your organization’s network. Isolate all wireless devices on their own, what your IT professionals call a, filtered subnet.</p>
<p>As is often the case with IT Security, this will be a risk vs. expense decision. It is important that the executives of a company make the final decision about whether or not to ask IT to implement the mitigation steps. Your IT Team will appreciate your deciding, and the choice is yours since, if there is a successful cyber-attack, the executives, especially the president, CEO, and owner will suffer the most.</p>
<p>Please forward this to everyone you know who uses wireless networks.</p>
<p>The post <a href="https://fosterinstitute.com/wireless-security-is-broken-what-you-need-to-do/">Wireless Security is Broken &#038; What You Need to Do</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New iPhone and iPad iOS 11 Can Quietly Override Your Attempt to Be Secure</title>
		<link>https://fosterinstitute.com/new-iphone-and-ipad-ios-11-can-quietly-override-your-attempt-to-be-secure/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 25 Sep 2017 15:18:28 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[iOS 11]]></category>
		<category><![CDATA[wi-fi best practices]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[wi-fi security]]></category>
		<category><![CDATA[Apple Control Center]]></category>
		<category><![CDATA[Apple Wi-Fi]]></category>
		<category><![CDATA[Apple Wi-Fi cyber security]]></category>
		<category><![CDATA[Cell Phone Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[iOS 11 Security]]></category>
		<category><![CDATA[iOS Wi-Fi]]></category>
		<category><![CDATA[ipad security]]></category>
		<category><![CDATA[iphone safety]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[mobile security]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Wi-fi security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2546</guid>

					<description><![CDATA[<p>The new Apple iOS 11 has a feature that appears to permit you to turn Wi-Fi on and off from the easy to reach Control Center. However, some people in the security community are concerned since the setting does no such thing. Your iPhone and iPad will prompt you to upgrade to the new iOS [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/new-iphone-and-ipad-ios-11-can-quietly-override-your-attempt-to-be-secure/">New iPhone and iPad iOS 11 Can Quietly Override Your Attempt to Be Secure</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The new Apple iOS 11 has a feature that appears to permit you to turn Wi-Fi on and off from the easy to reach Control Center. However, some people in the security community are concerned since the setting does no such thing.<span id="more-2546"></span></p>
<p>Your iPhone and iPad will prompt you to upgrade to the new iOS 11 soon. Having the most recent version of iOS is one strategy for being secure. Like Google does with the Android OS, Apple focuses on keeping the newest iOS free from security vulnerabilities.</p>
<p>But, with Apple’s new iOS 11, you need to be aware of a feature that might cause you to believe you are safe from Wi-Fi attacks when you are not.</p>
<p>Mobile devices are vulnerable to Wi-Fi attacks, and people who are serious about the security of their phone or tablet choose to turn off Wi-Fi except when they are at their office, home, or somewhere else they know they want to use W-Fi.</p>
<p>In the new iOS, turning off Wi-Fi in the Control Center does not really turn off Wi-Fi. Apple says this is a feature that keeps you from losing connectivity with Wi-Fi devices like an Apple TV or a Pen. But the practice of Apple leaving Wi-Fi on without your knowledge has created some discontent in some of us who want to help you be as secure as you want to be.</p>
<p>If you turn off Wi-Fi in the Control Center, your device will indeed disconnect online connections to Wi-Fi networks, at least temporarily, so it appears to work.</p>
<p>But Apple says that, as soon as the user walks or drives to a new location, the auto-join feature will turn itself back on without notifying or asking the user’s permission. I tried that, turning off Wi-Fi in my Control Center, and then drove a few miles just to see. To my happy surprise, the Wi-Fi did not re-enable. However, a little time later in my office, I noticed that the Wi-Fi had turned itself on again on its own.</p>
<p>Apple also says that auto-join will come on again automatically at 5 am. Sure enough, I turned off Wi-Fi in the Control Center at night, and when I checked the icon in the Control Center at 5:15am, the Wi-Fi was re-enabled.</p>
<p>You can read about this unexpected feature, on Apple’s own website: <a href="https://support.apple.com/en-us/HT208086" target="_blank" rel="noopener">https://support.apple.com/en-us/HT208086</a></p>
<p>You will be OK, as long as you know that if you want to turn off Wi-Fi, you have to go to the settings menu and turn Wi-Fi off there.</p>
<p>Please forward this to anyone you know who knows that turning off the Wi-Fi on their phone can increase their safety from attackers. Help them know that the only way to turn off Wi-Fi is to go to settings, not to the easy to reach control center.</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/new-iphone-and-ipad-ios-11-can-quietly-override-your-attempt-to-be-secure/">New iPhone and iPad iOS 11 Can Quietly Override Your Attempt to Be Secure</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attackers Can Hack Your Phone Without Having Your Phone</title>
		<link>https://fosterinstitute.com/attackers-can-hack-your-phone-without-having-your-phone/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 18 Nov 2016 15:52:26 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[Cell Phone Security]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Hack]]></category>
		<category><![CDATA[Cloud Safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Phone Hack]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2393</guid>

					<description><![CDATA[<p>Phone operating systems store much of the information that you have in your phone in the cloud too. So, attackers stealing information from your phone can be as simple as gaining access to that data in the cloud. Additionally, some of the apps on your phone can mine all of this information and more, even [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-hack-your-phone-without-having-your-phone/">Attackers Can Hack Your Phone Without Having Your Phone</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Phone operating systems store much of the information that you have in your phone in the cloud too. So, attackers stealing information from  your phone can be as simple as gaining access to that data in the cloud. Additionally, <span id="more-2393"></span>some of the apps on your phone can mine all of this information and more, even the amount of electricity left in your battery.</p>
<p>Gaining access to your account can provide everything from photos stored in your phone, to the passwords of Wi-Fi access points to which you&#8217;ve connected to in the past. That is very concerning.</p>
<p>When attackers know your browsing history, your email messages, your past search terms and the links you&#8217;ve clicked, they can use that information to perform very effective attacks tailored to trick you and the members in your company. With knowledge of your passwords, they can wreak all kinds of havoc.</p>
<p>Go get an idea of the kind of data that is stored in the cloud and is potentially accessible to attackers who use the right tools, see google dot com /policies/privacy/</p>
<p>Additionally, there are tools available, such as cloud explorer, that make it easy for even non-technical attackers to conveniently gain access to the sensitive information stored in your phone. </p>
<p>Please forward this to whomever is concerned about their mobile device&#8217;s security.</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-hack-your-phone-without-having-your-phone/">Attackers Can Hack Your Phone Without Having Your Phone</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Avoid Public Wireless Networks and Hot Spots</title>
		<link>https://fosterinstitute.com/avoid-public-wireless-networks-and-hot-spots/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 11 Jun 2015 16:21:46 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[free wifi]]></category>
		<category><![CDATA[hotspot]]></category>
		<category><![CDATA[hotspot safety]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[wi-fi best practices]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[wi-fi security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hotspots]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[personal hotspot]]></category>
		<category><![CDATA[phone hotspot]]></category>
		<category><![CDATA[remote working]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<category><![CDATA[WiFi]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2102</guid>

					<description><![CDATA[<p>As executives take summer vacations, they will be tempted to connect to public WiFi wireless network hotspots at airports, coffee shops, hotels, etc.  Before you connect, know the risks. When you connect to a network that isn&#8217;t under your control, someone else on the guest network could capture your data and even hack your computer. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/avoid-public-wireless-networks-and-hot-spots/">Avoid Public Wireless Networks and Hot Spots</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As executives take summer vacations, they will be tempted to connect to public WiFi wireless network hotspots at airports, coffee shops, hotels, etc.  Before you connect, know the risks.<span id="more-2102"></span></p>
<p>When you connect to a network that isn&#8217;t under your control, someone else on the guest network could capture your data and even hack your computer. Your IT Pros can take steps to reduce the risks, but it is best not to connect.</p>
<p>So, how do you work remotely?  Most phones these days permit you to connect your laptop through the phone to use the Internet. This functionality is often referred to as making a personal hot-spot. There are even devices that provide the 4G connectivity without using your phone.</p>
<p>Call your mobile phone service provider and ask how much of your data plan you use now. You might be pleasantly surprised that, especially using email and browsing the web, using your phone as a personal hot spot will be less expensive than you might think.</p>
<p>And a side benefit to connecting your laptop to the Internet through your phone:  the speeds may be faster too.</p>
<p>Please share this with everyone you care about who might be tempted to connect to a public wireless network.</p>
<p>The post <a href="https://fosterinstitute.com/avoid-public-wireless-networks-and-hot-spots/">Avoid Public Wireless Networks and Hot Spots</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber-Safe Holiday Travels</title>
		<link>https://fosterinstitute.com/cyber-safe-holiday-travels/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 19 Dec 2014 17:57:27 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[wi-fi best practices]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[wi-fi security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[data-sharing wi-fi.]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Hacking Hackers]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Sony Breach]]></category>
		<category><![CDATA[Sony Hacking]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[Wi-fi security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2006</guid>

					<description><![CDATA[<p>Many executives will be travelling for the holidays. It will be so tempting to use W-Fi wireless connections in airports, coffee shops, hotels, in-flight Wi-Fi… Most executives do not realize that using public Wi-Fi can be very dangerous. Rather than terrify you with all of the cyber-security risks companies face, because the Sony breach is [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/cyber-safe-holiday-travels/">Cyber-Safe Holiday Travels</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many executives will be travelling for the holidays. It will be so tempting to use W-Fi wireless connections in airports, coffee shops, hotels, in-flight Wi-Fi…<span id="more-2006"></span></p>
<p>Most executives do not realize that using public Wi-Fi can be very dangerous. </p>
<p>Rather than terrify you with all of the cyber-security risks companies face, because the Sony breach is doing that. Here is a better solution for wireless access:  Use the data-sharing function of your phone. </p>
<p>Most phones these days permit you to connect your laptop through the phone to use the Internet. The connection speeds are usually very fast, and unless you are watching movies, the amount of data you consume may be less than you think.</p>
<p>Wishing you a cyber-safe holiday season!</p>
<p>The post <a href="https://fosterinstitute.com/cyber-safe-holiday-travels/">Cyber-Safe Holiday Travels</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
