(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

A major vulnerability has been discovered that affects everyone that uses Wi-Fi. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-Fi users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2).

WPA2 has been the standard for securing a Wi-Fi access point, especially for businesses. However, WPA2 has a newly discovered flaw that allows a cybercriminal to reuse the encryption keys that are generated when a device and a router connect, which in turn allows them to intercept the data being communicated between the router and the device. This data could include credit card numbers, passwords, and any other information one would input online. Some networks could even allow data to be introduced from outside, for example, a website being infected with ransomware.

Details about the vulnerability will be released on November 1st, which means there is potential that they will fall into the wrong hands if they haven’t already. This gives businesses about two weeks to make sure they are prepared.

Currently, the biggest Achilles’ heel is on the client-side, which means the computers, laptops, and mobile devices are the first priority to update, but network hardware such as access points and routers are important as well.

Fortunately, Microsoft has already released an update to attend to this vulnerability, and Android devices will be rolling out updates during the coming weeks. Anyone running Windows 10 with automatic updates or has recently installed updates should have the fix. Other devices, including smartphones, tablets, and even your network routers and Wi-Fi access points should also be checked for updates.

How to Tell if Your Business is Safe from the KRACK WPA2 Vulnerability

For businesses, the most straightforward answer is if you are paying someone to monitor and maintain your entire network, they should be checking all devices to make sure they are patched to prevent this vulnerability. If you don’t have an agreement with an IT company such as NTConnections, or you don’t have someone on staff who is aware and knowledgeable about the potential threats to your network, it’s more than likely this vulnerability exists (along with many others).

If you aren’t sure, reach out to us as soon as possible. NTConnections can help you keep your network patched and up-to-date. For more information, call us at (703) 288-9767.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 19 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Mobile Devices Efficiency IT Support VoIP Business Managed Service Provider Email Miscellaneous IT Services Server Workplace Tips Disaster Recovery Business Continuity Upgrade Network Innovation Data Windows Hardware Software Save Money Saving Money Business Management Network Security Communication Computer Android Mobile Device Management Smartphones Holiday User Tips Microsoft Office Smartphone Browser Virtualization communications Managed IT Services Windows 10 Outsourced IT WiFi Hacking Chrome Data Backup BYOD Social Media Operating System Computers Mobile Computing IT Solutions Application Alert Small Business Apple Proactive IT Remote Monitoring Avoiding Downtime Cybercrime Big Data The Internet of Things Ransomware Quick Tips Social Engineering Automation Employer-Employee Relationship Information Technology Office Passwords Budget Collaboration Marketing Managed IT Services Recovery spam Data Recovery Telephone Systems Gadgets Health Mobility Going Green Bring Your Own Device Remote Computing VPN Vendor Management Save Time Cybersecurity Firewall App iPhone BDR Bandwidth Compliance How To Managed IT Wireless Technology Cloud Computing User Error Two-factor Authentication PowerPoint Windows 10 Website Excel Risk Management Phone System Office Tips Content Filtering Downtime Antivirus History Tablet Gmail Lithium-ion battery Value Memory Retail Search Analytics Router Private Cloud Vulnerability Networking Mouse Redundancy Artificial Intelligence IT Support Office 365 Internet of Things Data Storage Internet Exlporer Workers Word Data storage Biometrics Saving Time Business Intelligence Business Owner Outlook Document Management Online Currency OneNote Flexibility Money Hard Drives Printer IT Management Work/Life Balance Facebook Administration Entertainment Running Cable Current Events Physical Security DDoS Unified Threat Management Robot Skype Maintenance Unsupported Software Mobile Office Environment Google Drive Public Cloud Customer Relationship Management Phishing SaaS Identity Theft Best Available Data Security People Intranet Safety Programming Government Network Congestion Credit Cards Trending Meetings HaaS Fax Server Black Market Law Enforcement Data Management Solid State Drive Humor Statistics IT Consultant Apps Instant Messaging Licensing FENG Data Protection Productivity Streaming Media Password Wi-Fi Shortcut Amazon Web Services Samsung Windows Server 2008 Password Manager SharePoint Colocation Twitter Windows 8 Comparison Encryption Windows 7 Sports Bluetooth Company Culture Online Shopping Crowdfunding Windows 8.1 Update Botnet Monitor Hosted Solution eWaste Computing Infrastructure Tablets Specifications Data Warehousing Notifications Regulations YouTube USB Evernote Travel Reputation Wearable Technology End of Support Mobile Device Windows Media Player Social Millennials Servers NarrowBand Wireless Charging Customers Internet exploMicrosoft Best Practice Social Networking Hiring/Firing Root Cause Analysis Workforce Print Server IT Plan Flash Chromecast WIndows 7 Fiber-Optic Analyitcs Software as a Service Patch Management Advertising Data loss Telecommuting Computer Repair Sync Laptop Managing Stress Settings Net Neutrality Cables Update Scam Distributed Denial of Service Virus Virtual Desktop Remote Work LinkedIn Charger Software Tips Telephony Touchpad IT service Human Resources Unified Communications Virtual Reality Debate Google Docs Relocation Hybrid Cloud Uninterrupted Power Supply Computer Accessories Training Computer Care Start Menu HIPAA Domains Touchscreen Theft Bloatware Spam Blocking Voice over Internet Protocol Audit IaaS Cleaning Cameras Customer Service Video Surveillance HBO Mobile Keyboard Consultant Cortana Entrepreneur Education Multi-Factor Security Screen Mirroring Tech Support Printer Server Fraud Frequently Asked Questions Professional Services Hacker Google Apps Worker Commute Cost Management Piracy Computer Fan Lifestyle Cast Shadow IT Applications Amazon Tip of the week Tools User Wireless Files Science Infrastructure Television Troubleshooting Electronic Medical Records Techology Public Computer Employer Employee Relationship Legal Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Users Audiobook Netflix Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music