Are there KRACKs in your Wireless Network Security?

Are there KRACKs in your Wireless Network Security?

Written by SOS Tech Group on . Posted in Computer Security, IT News

 

Are there KRACKs in your Wireless Network Security?

On October 16, 2017, Belgian security researcher made public their findings that demonstrated fundamental design flaws in WPA2 that could lead to man-in-the-middle (MITM) attacks on wireless networks.

Named KRACKs, or key reinstallation attacks, this technique can theoretically be used by attackers to steal sensitive information from unsuspecting wireless users leveraging these flaws in the WiFi standard.

More details on these vulnerabilities are available on the researchers’ website at www.krackattacks.com.

What can I do to protect my wireless network?

We do recommend that you take immediate action to minimize the risk presented by these vulnerabilities.  We advise the following:

  • Patch all of your WiFi clients, whether Windows, Linux, Android, iOS or Mac OS based, with the latest KRACK updates from your client vendors. The attack is launched by compromising the wireless device, not the wireless router, so that is the most important area to focus on when you go about patching.
  • Check with your vendor to determine if you need to patch your wireless access points and/or routers. Ideally, your WiFi solution would be centrally managed allowing you to provide updates and patches in a timely fashion without crippling IT resources.
  • Add an additional layer of security by using VPN technology to encrypt all network traffic between your wireless devices and your firewall.
  • Transmit sensitive data only on TLS/SSL-encrypted web pages. Look for the green lock symbol in the address bar along with https in the URL.
  • Be on the lookout for unusual activity inside or outside your facility. In order to launch an attack using these vulnerabilities, an attacker must be physically located within Wi-Fi range of both the access point and the wireless client that is attempting to connect to the network. That means the attacker must be in or near your building, which makes it a bit more difficult to leverage than other Internet-only attacks.
  • One other note: there is no need to change Wi-Fi passwords as the KRACKs do not require the Wi-Fi password to be successful.

 

Get In Touch With SOS Technology Group Today

SOS can help you extend breach prevention to your wireless network while surveying if your current solution places you at risk.


SOS Technology Group
is a full-service IT consulting company focused on delivering IT Services and Solutions to businesses across the USA. We offer specialized, highly customized technology solutions for small and medium-sized businesses. Our experienced team will be able to assist you in creating a practical, sustainable IT infrastructure for your business, from helping develop your overall IT Strategy down to implementing a fully functional network in your environment.   We offer a range of IT Consulting and IT Outsourcing services including Network Management, Dedicated Servers and Managed Services, customized to meet your unique business needs, so you can stop worrying about technology and focus on your business.   Give us a call at 410-559-7020 or contact us here to get started. You can also follow us on Facebook, Twitter, LinkedIn, Pinterest, and YouTube.

 

Why Data Archival is so Critical

Written by SOS Tech Group on . Posted in Blog, Data Archiving

data archiving

With the constantly shifting technological landscape, it can be hard to keep your business on the cutting edge.

If you are wondering what data archiving is, what it entails, and what it means for your business, SOS technology group can help you learn all of its ins and outs. With the constantly shifting technological landscape, it can be hard to keep your business on the cutting edge, and to be sure that you are using all of the computers, systems, gadgets, and technological options and advancements out there to your business’s best advantage. To learn more about data archiving, read on.

Protecting Computer Equipment from the Elements

Written by SOS Tech Group on . Posted in Technology

With Hurricane Season upon us it is important to ensure that your computer equipment is protected from the elements.

Here are a few suggestions that can help you stay up and running during a storm and recover your systems after the storms have passed.

 

Store Data in the Cloud

It is important that all your systems have a Cloud Backup.  On premise solutions such as tapes/external hard drives are susceptible to damage just like your computer equipment so having a redundant cloud backup is key.

Physically Secure your Site

  • Verify that your Uninterruptible Power Supplies (UPS) are functional as well as Backup Generators if applicable.
  • Make sure that all your systems have Surge Protectors in place
  • Ensure that any computer equipment is kept off of the floor in the case of flooding
  • If possible shut down your computers and servers if you plan on evacuating your facilities
  • Take photos of your equipment in case you need to file an insurance claim after any storm damage

Configure Remote Access

Reach out to your IT company and inquire about setting up remote access to your systems. These solutions allow you to access most files/data from home in the case that your facility does not open right away. Setting up Cloud based email is a best practice in particular for events such as these.

 

Need Help With These Steps? SOS Tech Group Is Here to Help

Whether you are looking to perform a technological audit for your company or seeking a new security camera system for your commercial space, SOS Technology Group has the expertise and equipment to keep you talking around the clock. SOS Technology Group is a full-service IT consulting company that provides IT services and solutions for businesses throughout the United States. If you are interested in seeing how we can help your business, contact us online or give us a call at (410) 559-7020. For more technology tips, follows us on Facebook, Twitter, LinkedIn, and Pinterest.

BASIC STEPS TO ENHANCE YOUR COMPUTER SECURITY

Written by SOS Tech Group on . Posted in Computer Security, Technology

It’s easy in today’s world to forget about computer security.

Do you constantly have problems with viruses?  Does it seem like you can’t see an end to all the pop-ups, unwanted prompts and laggy programs?  You’re probably not keeping your computer very safe.  It’s easy in today’s world to forget about computer security, because you use it in the comfort of your own home or office.  It gives the illusion of safety.  In reality, there are a lot of nasty viruses out there that exist solely to make your life more difficult.  So, read on to see some simple tips that will help tremendously in the fight against viruses.

  • Don’t use Internet Explorer as your main browser.

 

No.  I promise it’s not easier to understand.  It’s hard for a lot of people to accept that, considering how long IE has been around, and how it comes pre-downloaded on most computers.  But IE isn’t nearly as secure as a lot of newer browsers, like Chrome or Firefox.  And, Chrome allows you to customize your browser to your liking using extensions.  There are even extensions that can enhance readability on your browser by using interesting techniques that make your brain work faster.  Just give it a shot!

 

  • Do extensive research before downloading anything at all.

 

You’ve got about three options when you first get your computer in regards to what you’re allowed to download without research: Chrome, Microsoft Office, and an antivirus program (and even then, you should look for something certified).  If your computer is for office use only, these are generally all you’ll need, anyway, unless your company says otherwise.  With any other download, make sure you do a quick Google search asking about its reliability.  Sometimes, if something is insecure, the first result will warn you away from it.

 

  • Install a firewall.

 

If you’re unfamiliar, a firewall is just a security system that runs whatever you come across through a filter before your computer really starts to use it.  Websites, downloads and other daily interactions are run through your factory-installed firewall all the time.  Every Windows computer, for example, has a ready-to-go firewall built-in–they’d never leave you completely unprotected.  But this isn’t always enough, and isn’t built to last.  A sturdy firewall will worker harder and faster than the one Windows gives you.

 

  • Need help with your computer security?  SOS Technology Group is here to assist.

 

SOS Technology Group is a full-service IT consulting company focused on delivering IT Services and Solutions to businesses across the USA. We offer specialized, highly customized technology solutions for small and medium-sized businesses. Our experienced team will be able to assist you in creating a practical, sustainable IT infrastructure for your business, from helping develop your overall IT Strategy down to implementing a fully functional network in your environment.   We offer a range of IT Consulting and IT Outsourcing services including Network Management, Dedicated Servers and Managed Services, customized to meet your unique business needs, so you can stop worrying about technology and focus on your business.   Give us a call at 410-559-7020 or contact us here to get started. You can also follow us on Facebook, Twitter, LinkedIn, Pinterest, and YouTube.

Healthcare Facilities are a Target of Cyber Attacks

Written by SOS Tech Group on . Posted in Security

PHI, also known as Protected Health Information, is very valuable on the Dark web of the internet. In fact a stolen Medical Record is 10 times more valuable than a stolen credit card number.

Cyber Criminals are increasingly targeting the $3.5 trillion US Healthcare industry with more than 16 million patient records exposed in 2016.  Since 2009 there have been over 171 million patient records stolen and sold on the dark web.

Tech Headaches? We can help! Contact us now »