Wednesday, September 21, 2011

Wardriving and Wireless Security

I just saw a report on KOMO news about three local businesses who were victims of "wardriving.". Wardriving is a fancy term for driving around with a car full of computer equipment searching for unsecured or poorly secured wireless networks. In and of itself wardriving isn't malicious. I know of delivery and service drivers how note and share locations of unsecured WiFi networks so they can check email, surf the Web on breaks, etc. There's no harm done and no one's the wiser. Unless they start downloading/uploading child porn or sending death threats. If someone wants to steal your stuff, though, an unsecured wireless network provides the bad guys with the equivalent of a seat at a computer in your home or office. If that computer is also unsecured, you may find your bank accounts and/or credit cards compromised and personal information stolen. How do you protect yourself? First and foremost you secure your WiFi network. If you're using a consumer-grade wireless router that's more than a couple of years old, buy a new one. Newer routers include easy setup utilities that will give you a decent level of security. Many of these newer routers even offer a separate connection for guests. Some things to consider when setting up your router, though. Don't name your network after your business. This is like leaving the box for your new HDTV in front of your house on trash day. Hackers are more likely to spend time cracking an obvious business network. Give your network an innocuous name or, better yet, hide your network's name (called an SSID). Secondly, use a strong password for people who access your network. Random letters and numbers are they way to go. Hackers have programs that use dictionaries to attempt to decipher passwords. People who regularly connect to your network should only have to enter this password once. And don't be shy about changing this password regularly. A dismissed employee or disgruntled customer with access to your network is a big security risk. Finally, use the most secure level of password protection. For example, WPA is a more secure form of encryption than WEP-128. WEP-128 is more secure than WEP-64. A simple Google search can answer most questions about security levels. Or you can call a trusted IT provider for advice. Check back tomorrow for the sequel to this article: how to keep your data safe if your wireless network is compromised.

No comments: