KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

A major vulnerability has been discovered that affects everyone that uses Wi-Fi. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-Fi users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2).

WPA2 has been the standard for securing a Wi-Fi access point, especially for businesses. However, WPA2 has a newly discovered flaw that allows a cybercriminal to reuse the encryption keys that are generated when a device and a router connect, which in turn allows them to intercept the data being communicated between the router and the device. This data could include credit card numbers, passwords, and any other information one would input online. Some networks could even allow data to be introduced from outside, for example, a website being infected with ransomware.

Details about the vulnerability will be released on November 1st, which means there is potential that they will fall into the wrong hands if they haven’t already. This gives businesses about two weeks to make sure they are prepared.

Currently, the biggest Achilles’ heel is on the client-side, which means the computers, laptops, and mobile devices are the first priority to update, but network hardware such as access points and routers are important as well.

Fortunately, Microsoft has already released an update to attend to this vulnerability, and Android devices will be rolling out updates during the coming weeks. Anyone running Windows 10 with automatic updates or has recently installed updates should have the fix. Other devices, including smartphones, tablets, and even your network routers and Wi-Fi access points should also be checked for updates.

How to Tell if Your Business is Safe from the KRACK WPA2 Vulnerability

For businesses, the most straightforward answer is if you are paying someone to monitor and maintain your entire network, they should be checking all devices to make sure they are patched to prevent this vulnerability. If you don’t have an agreement with an IT company such as KT Connections, or you don’t have someone on staff who is aware and knowledgeable about the potential threats to your network, it’s more than likely this vulnerability exists (along with many others).

If you aren’t sure, reach out to us as soon as possible. KT Connections can help you keep your network patched and up-to-date. For more information, call us at 605-341-3873.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy hackers Technology Email malware Network Security Cloud Internet Business Computing Google software User Tips Business Ransomware Efficiency Backup Data Small Business Mobile Device Management IT Support IT Support Microsoft Computer Android Phishing Smartphone Windows Hosted Solutions Productivity Network Gmail Managed IT Services Money cybersecurity Mobile Devices VoIP Facebook Hardware Data Security IT Management Microsoft Office communications Windows 10 Data Management Internet of Things Operating System Business Continuity Cloud Computing Alert Artificial Intelligence End of Support data breach vulnerability Office 365 Apple Bandwidth Update Managed IT Services Robot Smartphones Outlook Outsourced IT Unified Communications Social Media IT Services Hard Drive Cost Management Data storage Passwords Communication Upgrade Nextiva BDR security cameras Business Management Disaster Recovery Encryption Antivirus Networking Data Backup Digital Events App Hacking Access Control Big Data Data Protection The Internet of Things Innovation Word Patch Management Event Marketing Apps Law Enforcement Local Buzz Gadgets BYOD botnet South Dakota Project Management WiFi Analytics Automation YouTube vulnerabilities Collaboration Best Practice IoT Holiday security solutions Server Remote Monitoring Google Wallet Spam Social Engineering Google Docs Firewall Customer Service Legal Search Productivity IBM Browser Google Maps Scam Windows 10 Information Security Save Money Lunch and Learn Data Recovery SaaS Saving Money Bitcoin Document Management Information Technology Drones Start Menu Cryptocurrency History Politics News Music Cabling Excel Safety Business Mangement Webcam Penetration Testing Cybercrime Specifications Websites Writing Access botnet attack Government camera Tip of the week LastPass Microsoft Bookings Social Corporate Profile Phishing Scams Budget communication device Remote Computing Television Programming Software as a Service Redundancy Education Black Market Worker Spyware Rebrand Virtual Reality macbook Virtual Assistant booking process Audit Cloud Backup Google Drive Experience Hack File Sharing IT Consultation business owner Mouse Rapid City Virus Retail Web Servers DDoS attacks Applications Mobile Device Memory Event Maintenance Virtual Machines Telephony Sports Local Technology Workers IT Assessment Solid State Drive Physical Security communication solutions SharePoint Wireless Technology IoT Devices Law IT Managed Service Provider LiFi Business Growth Internet 101 Cache Tips and Tricks DDoS Hard Drive Disposal Virtualization security precautions identity theft Mixer Fortinet Network Congestion Risk Creep VoIP Sales Tax Samsung IT Strategy IT Security Society Deep Learning Lawyers Streaming Media Microsoft Office 365 Emergency Visible Light Communication Internet Connected Devices Dell ’s Sonicwall Global Management System email scam media experience Vendors Business Security IT for Oil Companies Windows XP Tablets Administration Unified Threat Management Freedom of Information Windows 8 Office Laptop IT Solutions eWaste Microsoft Office 365 features Business Technology Website Communications How To Password information Community Involvement Printing Risk Management Time Management Compliance Mobility Attorneys face Fake News Tech Support Vendor Management Tablet Computing Infrastructure Disaster Advertising Phone System Flash Download Downloads Kaseya Unified Threat Management SOX Managed Services Virtual Desktop enterprise productivity software surveillance cameras Microsoft Excel Printer Monitors Cortana Hosted Solution Hardware as a Service Content Filtering Settings healthcare Google Calendar Kaseya Connect Sarbanes-Oxley Act Computer Care Trend Micro Displays password manager LastPass AtomBombing Knowledge HaaS Managed IT Distributed Denial of Service Email Security tool Business Cards Business Communications Workplace Tips Conference Business Comunications End User Testing VPN Proactive IT Running Cable Press Release Chamber of Commerce Fast food Google Play Store Blockchain user confidence Bluetooth appointment Tech Terms Quick Tips Uninterrupted Power Supply Vendor Mangement Comparison Cleaning Office Tips Touchscreen Employer-Employee Relationship Messenger Sync Employer Employee Relationship Digital Payment Private Cloud breach methods Miscellaneous Microchip Books In Internet of Things Motion Sickness Public Cloud Taxes Downtime Telephone Systems Reading Users Machine Learning Paperless Office Hiring/Firing Piracy Health Bring Your Own Device Banking Relocation Administrator Hacker Software License 3D Printing base infrastructure CCTV Hacks Phone Systen Automobile Web Server security solution IT service Work/Life Balance Notifications Business Metrics Meetings end-of-support date Ordinary Computers CrashOverride Marketing holiday season Emails collaboration capabilities Chromebook Wi-Fi Rental Service Flexibility quantum computers UTM Tracking holidays Documents Supercomputer Threat management Reliable Computing scammers Text Messaging PDF Twitter IT Consultant Scalability network security professionals Computing scams G Suite Training Computer Malfunction Travel Playbook Language Processors Protection