4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

A major vulnerability has been discovered that affects everyone that uses Wi-Fi. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-Fi users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2).

WPA2 has been the standard for securing a Wi-Fi access point, especially for businesses. However, WPA2 has a newly discovered flaw that allows a cybercriminal to reuse the encryption keys that are generated when a device and a router connect, which in turn allows them to intercept the data being communicated between the router and the device. This data could include credit card numbers, passwords, and any other information one would input online. Some networks could even allow data to be introduced from outside, for example, a website being infected with ransomware.

Details about the vulnerability will be released on November 1st, which means there is potential that they will fall into the wrong hands if they haven’t already. This gives businesses about two weeks to make sure they are prepared.

Currently, the biggest Achilles’ heel is on the client-side, which means the computers, laptops, and mobile devices are the first priority to update, but network hardware such as access points and routers are important as well.

Fortunately, Microsoft has already released an update to attend to this vulnerability, and Android devices will be rolling out updates during the coming weeks. Anyone running Windows 10 with automatic updates or has recently installed updates should have the fix. Other devices, including smartphones, tablets, and even your network routers and Wi-Fi access points should also be checked for updates.

How to Tell if Your Business is Safe from the KRACK WPA2 Vulnerability

For businesses, the most straightforward answer is if you are paying someone to monitor and maintain your entire network, they should be checking all devices to make sure they are patched to prevent this vulnerability. If you don’t have an agreement with an IT company such as 4IT, or you don’t have someone on staff who is aware and knowledgeable about the potential threats to your network, it’s more than likely this vulnerability exists (along with many others).

If you aren’t sure, reach out to us as soon as possible. 4IT can help you keep your network patched and up-to-date. For more information, call us at 305-278-7100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows Disaster Recovery IT Support Innovation Business Continuity Hardware VoIP Workplace Tips Computer User Tips Saving Money Virtualization Upgrade Miscellaneous Windows 10 Mobile Devices Mobile Device Management Data Network Security Server Mobile Computing Alert Email Communication Network Save Money Microsoft Office Quick Tips Small Business communications Smartphone BYOD Going Green Mobile Office Information Technology Social Media Smartphones Health Apps Android Office Managed IT Services Outsourced IT Operating System Browser Chrome Gadgets Application Ransomware Productivity Disaster Managed IT Tablet Holiday Firewall WiFi Mobility Avoiding Downtime BDR Search Best Practice Risk Management Cybersecurity Data Management Cybercrime The Internet of Things Remote Computing Telephone Systems Unified Threat Management IT Solutions Spam Passwords Saving Time Vendor Management Hacking VPN Remote Monitoring History Facebook Employer-Employee Relationship Budget Apple Hard Drives Automation Data Backup Proactive IT Marketing Office Tips User Error Collaboration Law Enforcement Phishing iPhone Password Customer Relationship Management Wireless Technology Hosted Solution Computers Data Recovery Big Data Money Content Filtering Recovery Phone System Gmail Bring Your Own Device Router Government Lithium-ion battery Antivirus Humor Shortcut Administration Work/Life Balance Social Wearable Technology Maintenance Office 365 Current Events PowerPoint Virus Vulnerability Telephony Printer USB Analytics Encryption Google Drive Cloud Computing App Save Time SaaS Data Security Cost Management Audit Point of Sale HaaS Data Protection IT COnsultant Intranet Bandwidth Computer Repair Printer Server Business Intelligence Laptop OneNote Education Social Engineering Trending Net Neutrality Politics Users Personal Information Private Cloud Windows 8 Tech Support Wireless Outlook Unsupported Software Streaming Media Two-factor Authentication Network Congestion Internet Exlporer Managing Stress Uninterrupted Power Supply Excel online currency Help Desk Internet of Things Identity Theft Solid State Drive Sports Flexibility Travel Update Customer Service Efficency Samsung Biometrics Wi-Fi Retail Emergency IT Support Virtual Reality Artificial Intelligence Applications Windows 10 Social Networking Meetings hacker Display Instant Messaging Emails Transportation HIPAA Augmented Reality Entertainment Robot Paperless Office Computer Care Benefits Battery DDoS Computer Accessories Data Storage Fax Server Automobile Mouse End of Support Compliance Workplace WIndows 7 Document Management File Sharing eWaste Data Breach Storage Debate Advertising Inbound Marketing Cast Legal Regulations Windows 10s Touchpad Mobile Device systems Managed Security Nanotechnology Value Twitter Scam Cameras Hard Disk Drive User Surge Protector Tablets hack Root Cause Analysis Science Television Employer Employee Relationship HBO Virtual Desktop Nokia 3D Printing Presentation Worker Commute best practices Best Available Operating Sysytem NFL Bluetooth Cortana IT Technicians CrashOverride PDF Files IT Management Scalability data breach ISP Word SharePoint Legislation Safety Settings Text Messaging Chromecast WIndows Server 2008 How To risk management Programming Blogging Upgrades Windows Ink Teamwork Busines Continuity Administrator Training Patch Management Networking Near Field Communication Colocation Website Consultant Google Maps The Blindside Of Commerce Hard Drive Access Company Culture Regulation Human Resources Black Market IT consulting OneDrive Touchscreen Software as a Service Running Cable IT Security Uograde Amazon Images Co-managed IT Cleaning Sync Reliable Computing Experience iOS Data Loss Keyboard Managed IT Service Bloatware Avoid Downtime Lifestyle Adobe Managed IT Services Music Computer Fan Ebay Google Docs Hiring/Firing Computing Data storage Licensing Branding Distributed Denial of Service Books Dark Web Wiring Microsoft Excel Smart Technology Screen Mirroring Information Video Games Mobile IT solutions Tutorial Professional Services IT service Taxes Domains Supercomputer Electronic Medical Records Gift Giving IT Budget Buisness Reputation Comparison Specifications Microblogging Youtube Shadow IT Sales Relocation Managed Service Provder Webinar Webinar