Wireless: 5 Tips for Keeping It Secure

22 Jun

wireless-150420_640
Everyone knows that wireless networking (WiFi) is here to stay. A large number of companies, OST Security clients included, utilize WiFi as a way to provide employees network and Internet access when they’re using laptops or smartphones. Some organizations choose to offer the general public access to WiFi as well, usually as part of a commitment to customer convenience or experience.

From a security standpoint, most wireless implementations are a nightmare. While we’ve seen dramatic improvement over the past several years, wireless is still a weak point for many organizations. In this article, we’ll look at the key elements to ensuring the WiFi networks at your place of work are optimized for security:

Leverage a strong encryption/authentication method

This might seem obvious, but we still see the occasional WEP-encrypted network. For readers who aren’t in the know, there are different kinds of encryption methods that can be used to secure a wireless network. WEP (or Wired Equivalent Privacy) is a dated, easily defeated encryption method. Organizations should be using at least WPA/WPA2, ideally with added measures such as EAP (using a central authentication server) and MAC address filtering.

Segment from your production network

Every once in a while, OST Security will perform an assessment and see that a wireless network owned by the client is not segmented from their production domain. This means that a bad guy could sit in your parking lot, hop on your WiFi, and perform devastating attacks – just as though he was physically inside your building and plugged into a wall port. The risk here is obvious. Hosts on wireless networks should not be able to communicate with hosts on your wired, production network.

Separate Internet connection

Particularly if you have an open wireless network to give the public access to the Internet, it’s a good idea to have this network on a separate Internet connection entirely. This means that you’ll have to purchase another line from your ISP – but the tradeoff in risk reduction is worth it. Say, for example, that someone commits a computer crime while connected to your public wireless network. If you have a separate Internet connection in place for this public network – and a User Agreement in place that those accessing it must accept – you have built a good amount of legal protection for your organization.

Limit key distribution

For internal wireless networks (ones used by employees), it’s a good idea to limit the distribution of your access key. Ideally, only one or two individuals in the organization would know the key. When an employee wants access to the wireless network, that individual can enter the key for them. Most devices allow for the retention of a wireless key, so you wouldn’t need to have it re-entered all the time. Doing this would drastically decrease the likelihood of inappropriate access to the internal WiFi (i.e. by non-employees).

WIPS/WIDS

Wireless intrusion prevention systems and wireless intrusion detection systems are an excellent addition to a WiFi network already employing the best practices recommended above. WIPS/WIDS usually come in the form of a physical network device that monitors the wireless spectrum for malicious activity (for example, a fake access point trying to lure victims into connecting). WIPS implementations generally include not only the detection of this kind of activity, but also offer countermeasures to defeat attacks.

WiFi networks are a fact of many modern computing environments. If your organization has one (or more), taking the above precautions will effectively minimize many of the risks associated. For a full IT security assessment, including an analysis of wireless configurations, please contact dkilpatrick@ostusa.com.

—–

W. Scott Montgomery

W. Scott Montgomery

W. Scott Montgomery joined OST in the spring of 2009 as the Manager of the OST Security Practice. Scott joined OST with over 30 years of IT and IT Security related experience. Scott has personally  performed more than 1,000 Security Assessments for several hundred organizations. Using a proprietary and unique assessment approach, developed by Scott and used since 1998, the OST Security Team has the  ability to gather, analyze and assess the security of any organization.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: