KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

A major vulnerability has been discovered that affects everyone that uses Wi-Fi. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-Fi users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2).

WPA2 has been the standard for securing a Wi-Fi access point, especially for businesses. However, WPA2 has a newly discovered flaw that allows a cybercriminal to reuse the encryption keys that are generated when a device and a router connect, which in turn allows them to intercept the data being communicated between the router and the device. This data could include credit card numbers, passwords, and any other information one would input online. Some networks could even allow data to be introduced from outside, for example, a website being infected with ransomware.

Details about the vulnerability will be released on November 1st, which means there is potential that they will fall into the wrong hands if they haven’t already. This gives businesses about two weeks to make sure they are prepared.

Currently, the biggest Achilles’ heel is on the client-side, which means the computers, laptops, and mobile devices are the first priority to update, but network hardware such as access points and routers are important as well.

Fortunately, Microsoft has already released an update to attend to this vulnerability, and Android devices will be rolling out updates during the coming weeks. Anyone running Windows 10 with automatic updates or has recently installed updates should have the fix. Other devices, including smartphones, tablets, and even your network routers and Wi-Fi access points should also be checked for updates.

How to Tell if Your Business is Safe from the KRACK WPA2 Vulnerability

For businesses, the most straightforward answer is if you are paying someone to monitor and maintain your entire network, they should be checking all devices to make sure they are patched to prevent this vulnerability. If you don’t have an agreement with an IT company such as KT Connections, or you don’t have someone on staff who is aware and knowledgeable about the potential threats to your network, it’s more than likely this vulnerability exists (along with many others).

If you aren’t sure, reach out to us as soon as possible. KT Connections can help you keep your network patched and up-to-date. For more information, call us at 605-341-3873.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 20 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology hackers Email Business Computing Cloud Internet malware Google Network Security software Efficiency Ransomware User Tips Backup Data Business Microsoft Computer IT Support Android Managed IT Services Small Business Smartphone Productivity Windows VoIP Hosted Solutions IT Support Network Mobile Device Management IT Management Operating System Business Continuity Money Mobile Devices Facebook Hardware Artificial Intelligence Windows 10 cybersecurity Cloud Computing communications Data Management Passwords Upgrade Communication Outsourced IT security cameras Business Management Disaster Recovery Encryption Alert data breach End of Support Apple Phishing Bandwidth Nextiva BDR Smartphones Microsoft Office Outlook IT Services Unified Communications Social Media Antivirus Internet of Things Data storage Update Gmail Google Wallet Local Buzz Google Docs Firewall Legal Spam Productivity South Dakota Analytics Browser Drones Save Money SaaS Saving Money IoT Document Management Information Technology History Server Politics Remote Monitoring App vulnerability Networking Customer Service Innovation Search Big Data IBM Law Enforcement The Internet of Things Managed IT Services Google Maps Robot Apps Scam BYOD Lunch and Learn Data Recovery Start Menu Windows 10 WiFi Automation YouTube Hard Drive Events Data Backup Access Control Best Practice Word security solutions Patch Management Event Marketing Data Security How To Corporate Profile Password Microsoft Office 365 features Windows XP Phishing Scams information Community Involvement Programming Windows 8 Software as a Service Redundancy Worker Website Spyware face Rebrand Vendor Management Audit Cloud Backup Google Drive Compliance File Sharing IT Consultation Flash Download Rapid City Tech Support Virus Project Management Web Servers Advertising enterprise productivity software surveillance cameras Applications Monitors Hosted Solution Maintenance Content Filtering Virtual Machines Telephony Local Technology Workers Virtual Desktop IT Assessment Settings healthcare Physical Security IoT Devices Printer Law IT Managed Service Provider Internet 101 Cache Trend Micro Tips and Tricks Displays Collaboration Fortinet Managed IT Risk Creep VoIP password manager LastPass AtomBombing Sales Tax Samsung IT Strategy tool Workplace Tips Lawyers Emergency Fast food Google Play Store Internet Connected Devices Proactive IT Quick Tips Business Security IT for Oil Companies Cryptocurrency user confidence Bluetooth appointment Tablets Administration Office Tips Laptop IT Solutions Business Technology Communications Music Printing Risk Management Cleaning Time Management Mobility Safety Office 365 Webcam Tablet Hacking Attorneys Disaster botnet attack Phone System Government camera Writing Downloads Kaseya Unified Threat Management LastPass Microsoft Bookings communication device Remote Computing SOX Managed Services Budget botnet Social Hardware as a Service Virtual Reality macbook Black Market Gadgets Google Calendar Hack Kaseya Connect Information Security booking process Education business owner Computer Care Sarbanes-Oxley Act Knowledge DDoS attacks HaaS Experience Retail Business Communications Conference Business Comunications Email Security Memory Event Running Cable Press Release communication solutions Chamber of Commerce End User Testing VPN Solid State Drive Tech Terms Uninterrupted Power Supply Vendor Mangement vulnerabilities DDoS Sports Business Growth Network Congestion Comparison News Wireless Technology Touchscreen Virtualization security precautions identity theft Mixer Cabling LiFi Digital Cost Management Deep Learning Data Protection Business Mangement Dell ’s Sonicwall Global Management System Microsoft Office 365 media experience Vendors Specifications Society Websites Streaming Media Penetration Testing Visible Light Communication Access Office Social Engineering Business Metrics Public Cloud Taxes Television end-of-support date holiday season Wi-Fi Rental Service collaboration capabilities Chromebook Paperless Office Marketing Mouse UTM Flexibility holidays Documents Cortana Threat management Reliable Computing scammers Text Messaging PDF Twitter Computing CCTV Distributed Denial of Service Scalability scams Phone Systen Web Server G Suite IT service Language Processors Computer Malfunction Travel Employer-Employee Relationship Meetings Ordinary Computers Sync Messenger CrashOverride Miscellaneous Microchip Emails Private Cloud quantum computers In Internet of Things Books Tracking Motion Sickness Supercomputer Telephone Systems Reading Hiring/Firing Machine Learning Health Bring Your Own Device IT Consultant network security professionals Users Administrator Banking Relocation Hacker Training 3D Printing Playbook base infrastructure Hacks Automobile Holiday Employer Employee Relationship breach methods security solution Digital Payment Unified Threat Management Work/Life Balance Notifications