Welcome!

Cloud Security Authors: Liz McMillan, Pat Romanski, Zakia Bouachraoui, Elizabeth White, Yeshim Deniz

Related Topics: Cloud Security

News Feed Item

AirTight Study of Financial Districts' Airspace Reveals Wi-Fi Security Risks

Key Findings Demonstrate a Pattern of Wireless Data Leakage and Poor Security Practices in Six U.S. Cities and London

MOUNTAIN VIEW, CA -- (Marketwire) -- 05/13/09 -- There appears to be a very high incidence of wireless vulnerabilities and poor wireless security practices in the financial districts of seven cities according to the results of a survey released today by AirTight® Networks, the industry leader for wireless security and compliance solutions. AirTight issued the findings of its Financial Districts Scanning Report for wireless security vulnerabilities in the financial districts of New York, Chicago, Boston, Wilmington (DE), Philadelphia, San Francisco and London.

The key findings demonstrate a pattern of careless use of Wi-Fi access points and lack of knowledge about the vulnerabilities wireless can introduce into a business environment and how to protect corporate data. This follows the same patterns of wireless vulnerabilities that AirTight found in its Airport Scanning Reports last year, but with potentially much more significant consequences to an already battered industry. That is that the airspace in these financial districts is dominated by open or poorly encrypted (WEP) wireless access points (APs). Many of these APs were using ineffective security practices such as hiding the SSID, and personally identifiable information was leaking out.

Key Findings

-- 57% of the airspace scanned was dominated by open or WEP encrypted
   access points.
     -- Data flowing through these access points can be sniffed, decoded,
        captured and misused
     -- Open and WEP encrypted access points pose a serious risk when
        connected to an internal network
     -- Within AirTight's 5 minute scans, several instances of open APs
        were connected directly to internal networks and leaking the
        identities of active users including company executives
-- 61% of open and WEP encrypted access points were consumer or SOHO grade.
     -- These cannot be detected or centrally managed using wired
        security tools
     -- Many were found to be operating in the default factory mode
-- 13% of active Wi-Fi client devices (laptops, iPhones) were operating
   in ad hoc mode.
     -- These were actively looking to connect to viral networks such as
        "free public Wi-Fi," "free Internet access"
     -- These are also vulnerable to wi-phishing or honeypotting
-- 27% of open APs were hiding their SSIDs in the mistaken belief that
   this offers protection from sniffing.
-- Enterprise grade APs were found configured in WEP mode instead of WPA
   or WPA2 even though these APs can support the stronger encryption.

"In light of some rather spectacular data breaches involving financial information in recent years -- both wired and wireless -- in financial districts we expected to find well protected and configured networks, open or guest access isolated from corporate networks and strict enforcement of Wi-Fi security policies," said Pravin Bhagwat, CTO of AirTight. "What we found instead should give pause to security administrators working in industries with highly sensitive information such as financial services."

In its study of 43 companies that suffered a data breach last year, the Ponemon Institute found the total cost of coping with the consequences rose to $6.6 million per breach, up from $6.3 million in 2007 and $4.7 million in 2006. The cost per compromised record in 2008 rose 2.5% over the year before to $202 per record, according to the study being released last week.

"In this time of heightened scrutiny of banks and other financial services organizations, a major breach would certainly be a blow to their reputation as well as their bottom line," continued Bhagwat. "Wireless networks provide great efficiencies for corporations and, more and more, employees are demanding the ability to work anywhere at anytime. However, when the data that is being transmitted is so sensitive, all methods available to protect it must be undertaken. It is time for all of these enterprises and government agencies to recognize the risks and implement best practices."

Wireless Security Checklist

While there are many ways to protect your network from wireless breaches, AirTight has developed a list of best practices to get started. A few are listed here.

--  Enable encryption, to protect the data that is being transmitted. Opt
    for WPA, preferably WPA2, rather than WEP.
--  Conduct ongoing wireless security audits and scans to detect the
    presence of unauthorized Wi-Fi devices and activity in your premises.
    

The full Wireless Security Checklist can be found on AirTight's Website page for the Financial Districts Scanning Report.

How the study was conducted

For this study, AirTight set out to understand the risks to data from financial services organizations created by poor security practices. Just as with its earlier Airport Studies, AirTight continues to find troubling results regarding the security posture of private Wi-Fi networks as well as the rapid spread of viral Wi-Fi networks.

AirTight wireless security researchers doing "war walks" took five minute scans at randomly selected locations in the financial districts of seven cities -- New York, Chicago, Boston, Wilmington (DE), Philadelphia, San Francisco and London -- from February through April, 2009. Overall, the signal from more than 2000 Wi-Fi access points was sampled. The scans were typically collected near the buildings where financial institutions were housed including banks and stock exchanges.

You can now follow AirTight on Twitter @AirTightWIPS

Read and comment on the AirTight Networks Blog

If you would like more information on the AirTight Financial District Study, please contact Della Lowe at [email protected] or at 650-934-8191 (office) or 650-868-5829 (mobile).

About AirTight

AirTight Networks is the global leader in wireless security and compliance solutions providing customers best-of-breed technology to automatically detect, classify, locate and block all current and emerging wireless threats. AirTight offers both the industry's leading wireless intrusion prevention system (WIPS) and the world's first wireless vulnerability management (WVM) security-as-a-service (SaaS). AirTight's award-winning solutions are used by customers globally in the financial, government, retail, manufacturing, transportation, education, health care, telecom, and technology industries. AirTight owns the seminal patents for wireless intrusion prevention technology with 10 U.S. patents and two international patents granted (UK and Australia), and more than 25 additional patents pending. AirTight Networks is a privately held company based in Mountain View, CA. For more information please visit www.airtightnetworks.com

AirTight Networks and the AirTight Networks logo are trademarks; AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks are the property of their respective owners.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Media Contact
Della Lowe
T: 650.934.8191
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the 22nd International CloudEXPO | DXWorldEXPO "Early Bird Registration" is now open. Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...