Do As Security Pros Say, Not As They Do
Monitoring at the RSA Conference found plenty of security vulnerabilities on the wireless networks the security professionals were using.
Monitoring at the RSA Conference found plenty of security vulnerabilities on the wireless networks the security professionals were using.Who watches the watchers? According to word of some security vulnerabilities at last week's RSA conference, pretty much anybody who wants to, according to Motorola Airdefense.
Anybody, that is, who had the skills to tap into the ad hoc wireless networks that popped up during the conference.
Airfense's monitoring of wireless nets at the conference found 315 ad hoc networks, with over 60% of those running long-vulnerable WEP security protocol.
Benefit of the doubt seems appropriate here: My guess is that the majority of the security pros at RSA knew exactly what they were doing, trading the convenience of ad hoc access for the risks they took.
Question is, are they taking similar risks with your business networks? And if they're the ones with oversight of those networks, how would you know?
Read more about:
2010About the Author
You May Also Like