Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:00 AM
Connect Directly

Survey: 1 in 4 WLANs Unsecured

RSA survey finds more WLANs, but not much security

Up to 25 percent of business wireless LANs don't encrypt their traffic -- and that's only if you count the much-maligned Wireless Equivalency Protocol (WEP) as security, according to a new survey that will be released today by RSA Security.

"One of four business networks are not providing security at all," says Toffer Winslow, vice president of product management for encryption company RSA, the security division of EMC. "WEP today doesn't really constitute security, but we're being charitable counting it as 'secure.'"

RSA focused its study on three cities -- London, New York, and Paris. The study found major growth. In London, the number of wireless APs grew by 160 percent from last year, in New York by 49 percent, and in Paris by 44 percent.

Much of that growth came from the business side. "Business access points are growing more than hotspots," Winslow says.

The good news is that the number of vulnerable WLANs has dropped from last year. The figures in London went from 26 percent in 2006 to 19 percent in 2007; New York dropped from 25 percent to 24 percent, and Paris dropped from 22 percent to 20 percent.

"But in absolute numbers, there are more unsecured business networks out there than before, because there's a high underlying growth," RSA's Winslow says.

Winslow was disturbed that many of these businesses don't bother to change the default administrative user name and password on their wireless equipment. "They don't go in and change those settings, so it's reasonable for a hacker to do a sniffer test and see if he can use the default settings," he says. "In London, 30 percent of all businesses and consumer WLANs were using default settings."

What about advanced encryption, such as WPA and 802.11i? In New York, 49 percent of business APs were implementing such advanced encryption. About 48 percent use these technologies in London, and 41 percent in Paris.

The RSA report points out that users could easily connect to an unsecured business WLAN rather than a wireless hotspot -- either on purpose or accidentally -- opening the organization up to serious risks such as data theft, identity theft, or attacks such as denial of service.

RSA recommends that when mobile users must connect via a hotspot, they should use their corporate VPN connection and WEP or other advanced encryption, as well as strong authentication. He says RSA has a similar policy, so that when he jumps on the corporate WLAN while he's in a meeting, for instance, he uses a VPN link and SecureID for authentication.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • RSA Security Inc. (Nasdaq: EMC)
  • World Cellular Information Service (WCIS) Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Cybersecurity Industry: It's Time to Stop the Victim Blame Game
    Jessica Smith, Senior Vice President, The Crypsis Group,  2/25/2020
    Google Adds More Security Features Via Chronicle Division
    Robert Lemos, Contributing Writer,  2/25/2020
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    6 Emerging Cyber Threats That Enterprises Face in 2020
    This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
    Flash Poll
    How Enterprises Are Developing and Maintaining Secure Applications
    How Enterprises Are Developing and Maintaining Secure Applications
    The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-02-27
    In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.
    PUBLISHED: 2020-02-27
    openssl_x509_check_host in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
    PUBLISHED: 2020-02-27
    openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
    PUBLISHED: 2020-02-27
    openssl_x509_check_ip_asc in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
    PUBLISHED: 2020-02-27
    Type confusion in V8 in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.