Hot Spot Dangers

Security experts say that employees are increasingly exposing personal and professional information unknowingly as they log in at Wi-Fi hot spots. Although these breaches haven't yet made big headlines, given corporate America's increasing reliance on smartphones, laptops and other portable devices, it's only a matter of time, experts say.

By Mary K. Pratt
Tue, April 20, 2010

Computerworld — Security experts say that employees are increasingly exposing personal and professional information unknowingly as they log in at Wi-Fi hot spots. Although these breaches haven't yet made big headlines, given corporate America's increasing reliance on smartphones, laptops and other portable devices, it's only a matter of time, experts say.

20 Crazy Things People Do to Get Wi-Fi Connections

Ryan Crumb, director of information security for PricewaterhouseCoopers Advisory Services, has seen all sorts of information gleaned from hot spots -- including Social Security numbers, corporate financial data and information about M&A deals -- that was never meant for him to see. Sometimes Crumb deliberately looks to see what unprotected data is traveling over the network in public spaces.

"It's an inherent problem with being on a public space," he says.

Steps IT can take to protect data from hot-spot dangers

* Establish and enforce strong authentication policies for devices trying to access corporate networks.

* Require employees to use a corporate VPN (virtual private network) and encryption when making a connection and exchanging data; better still, set up employee computers so that devices automatically connect to the VPN and encrypt data after making sure the computer or device hasn't been lost or stolen.

* Make sure all devices and software applications are configured properly and have the latest patches.

* Ensure that corporate security policies prevent workers from transferring sensitive data to mobile devices or unauthorized computers.

* Use air cards, which require a service plan, instead of hot spots for wireless connections.

Crumb, who works with clients to find and fix security weaknesses, says it's not hard to find such data, as it's often heading in and out of hot spots via e-mail.

"Hot spots are great for the coffee shops, but people conducting business have to understand it's their responsibility to protect themselves. They might as well be putting it on a billboard and run down the street," says CISSP Marc Noble, director of government affairs at (ISC)2, a nonprofit organization that educates and certifies information security professionals.

Most employees 'uninformed'

While many techies are aware of the risks of these so-called black holes and what it takes to minimize them, security leaders say the average worker isn't as well informed, leaving valuable data vulnerable.

"It's a hard challenge to fix, because users want to be mobile. They want to use any device to get to their spreadsheets or their presentations at these hot spots," Crumb says. "But all it takes is one vulnerable laptop to tarnish a whole company. All it takes is one misconfigured machine."

Continue Reading

Originally published on www.computerworld.com. Click here to read the original story.
Our Commenting Policies