Wi-Fi Can Leave Files Wide Open

by Talk Business & Politics ([email protected]) 84 views 

Industrial espionage used to be as complicated as stealing documents off a desk, or planting a mole.

Now thanks to Wi-Fi — wireless fidelity technology — a retail vendor who lives near a competitor, for example, can jump on his rival’s home wireless network and peek at sensitive data. Will Hurst, mobile solutions architect at IntelliMark IT Business Solutions in Rogers, said depending on a system’s complexity, hackers could even gain access through a home Wi-Fi to an office server.

Wi-Fi, the latest must-have gadget for executives, allows laptop users to connect to the Internet without wires at home or in public “hot spots.”

Some local Wi-Fi zones include the Northwest Arkansas Regional Airport (which in April 2003 began beaming its service over a 10-mile radius), part of the University of Arkansas, Copeland’s Restaurant in Rogers and numerous local hotels.

According to Gartner Inc., a global research firm based in Stamford, Conn., by 2007, there will be about 31 million Wi-Fi users nationwide. But all that mobility comes at the price of higher hacking risks.

E-snoopers need only the ability to see the wireless network, which typically means a physical proximity with store-bought hardware and hacking software that’s available on the Internet.

“We have this double-edged sword called Wi-Fi,” Hurst said. “Because it is a standard, it opens itself up to deviants and hackers.”

Hurst said he can get on three private Wi-Fi networks from his home in Rogers. He said a security assessment of his entire neighborhood showed 47 networks and only 30 percent of those were secure.

Brady Doty of IfWorld Inc., said he can get on one of his Springdale neighbor’s networks. He said most people don’t have hackers in the neighborhood, but at the same time, it’s a potential open invitation to client files on the computer and at the office.

Many companies use a Virtual Private Network (VPN) link, which secures data while it’s traveling from one computer to another, but Hurst said an open network at home could inadvertently allow access to the files before they’re transferred.

“I have not come across one company who has any guidelines about home networks,” Hurst said. But, he said, many larger companies don’t allow employees on the corporate network without a secured corporate computer. That practice significantly reduces the risk of a security breach.

Hurst said there is no such thing as a 100 percent secure network, but that there are several ways people can deter hackers without investing a lot of time or money:

• Change default passwords — Off-the-shelf Wi-Fi systems come with an encryption program, but it’s important to enable the feature and change the passwords.

• Turn off the broadcast feature — Store-bought Wi-Fi systems are easy to set up because they “broadcast” information. Turn the feature off after installation.

• Password protect shared hard drives — Simply requiring one hard drive to authenticate another could deter a hacker.

• Download and install software updates — Microsoft operating systems have many holes that are easily exploited. Utilize the automatic updater to thwart breaches.

• Get a broadband modem with a firewall — For wired networks, some ISPs offer modems without a firewall program. Sensitive data is worth the purchase price of a secure modem.

• Have up-to-date virus software — Wi-Fi hot spots present the potential for picking up viruses and worms. Be on top of the latest software.