Many people using wireless networks are opening themselves up to basic hacker attacks, warns Telspace MD Dino Covotsos.
"I recently drove through the Sandton area and measured 26 wireless networks of which about 14 were very insecure," he relates. "It`s easy for wardrivers (wireless hackers) to hijack your bandwidth, snoop on your e-mail or steal your passwords or other sensitive information off your wireless network, whether it`s at a business or in the home."
Covotsos is a security specialist who is the founder and MD of Telspace Managed Security Services. He believes it is vital to make people aware of the risks they run when operating a wireless network. Telspace provides network security checks and countermeasures for SMEs, a process that has given Covotsos unique insights into new threat areas.
Wireless networks can have a range of several hundred metres that enables passers-by to use your network at will. There is a trend that Covotsos has spotted where computer hackers are increasingly turning to the sport of WiFi hacking because it`s so easy to do. Using high-powered antennas they can pick up WiFi networks from over a kilometre away, and surveying wardriving Web sites like Wigle.net they can find millions of wireless access points, or hotspots, around the world.
To counter unauthorised access, Covotsos recommends setting passwords, setting up encryption on access points and MAC address authorisation to deter eavesdroppers. Network access can be allowed for only specified computers and while encryption won`t stop a determined hacker, regular security checks can uncover instances where hackers have accessed the system to leave Trojans, spyware or viruses on the network.
Wireless network routers have a number of built-in security features such as firewall software to block attacks through the modem and encryption to scramble the radio dialogue between the router and its clients. But Covotsos says many WiFi users are not bothering to change the default passwords when installing their WiFi network.
The problem is that many hackers know these default passwords, a loophole that opens home and office networks to e-mail snooping, password pilfering and data theft. Phone calls could also be vulnerable to eavesdropping as VOIP software is increasingly used to make phone calls over the Internet. Covotsos predicts that we`ll soon see WiFi-enabled cellphones on the market that people will use to make free VOIP calls through unsecured wireless networks.
He also warns that hackers will create new breeds of computer virus that target WiFi networks. Viruses can target WiFi cellphones through e-mail and these new threats could disable the phone or divert calls to others on its contacts list.
To help end-users combat security breaches through wireless or other Internet connections, Telspace provides an independent IT security risk analysis that generates a complete report on the user`s network. The report shows exactly where security weaknesses exist and recommends various options to resolve these.
"We can also use these details to deliver the intended security solution, whether it is a small bug fix or a full-scale firewall solution," adds Covotsos.
He points out that many South African companies are taking advantage of the current bandwidth boom through high-speed Internet connections including WiFi. But, he warns: "Many companies are connecting their businesses to the Internet via permanent links are doing so with little or no security procedures in place and this goes for wireless configurations too."
Once weaknesses in the system have been identified, Telspace offers a range of managed system security solutions. These cover patching of workstations and servers, firewall and anti-virus implementations, regular vulnerability scans, network security assessments and monitoring, protection of hosted servers, and a 24-hour emergency callout service.
Its network maintenance contracts cover data backup on a daily, weekly or monthly basis, on-site support on either a per hour or per workstation fee structure, and telephonic support and trouble-shooting. Differing response times can be negotiated from client to client.
"It`s about minimising the complexity around IT security solutions - after taking a close look at the associated risks and balancing this against the budget available to each customer," Covotsos relates.
If you are interested in keeping hackers at bay, keeping your information secure, having your network secured, creating a security policy or even just asking about security packages, contact Dino on 082 352 9296 or admin@telspace.co.za.
Telspace Web site: http://www.telspace.co.za
Share