Do As Security Pros Say, Not As They Do

Monitoring at the RSA Conference found plenty of security vulnerabilities on the wireless networks the security professionals were using.

Keith Ferrell, Contributor

March 9, 2010

1 Min Read

Monitoring at the RSA Conference found plenty of security vulnerabilities on the wireless networks the security professionals were using.Who watches the watchers? According to word of some security vulnerabilities at last week's RSA conference, pretty much anybody who wants to, according to Motorola Airdefense.

Anybody, that is, who had the skills to tap into the ad hoc wireless networks that popped up during the conference.

Airfense's monitoring of wireless nets at the conference found 315 ad hoc networks, with over 60% of those running long-vulnerable WEP security protocol.

Benefit of the doubt seems appropriate here: My guess is that the majority of the security pros at RSA knew exactly what they were doing, trading the convenience of ad hoc access for the risks they took.

Question is, are they taking similar risks with your business networks? And if they're the ones with oversight of those networks, how would you know?

Read more about:

2010

About the Author(s)

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights