KRACK WIFI Vulnerability

March 29, 2018

If you use Wi-Fi networks, you could be at risk

If you are one of the more than 50% of organizations that uses Wi-Fi as your default network connection, please read this important note. 

The situation:By now you may have heard that there's a serious vulnerability affecting organizations leveraging Wi-Fi networks. Most devices and routers currently rely on WPA2 ("Wi-Fi Protected Access II") to encrypt their Wi-Fi traffic. If you are logged onto a wireless network and an attacker is within range, they can use KRACK (Key Reinstallation Attack) to bypass WPA2 and access your non-encrypted data (credit card numbers, passwords, banking information, photos, emails, messages and more).   Here’s the current list of vendors whose equipment is vulnerable. 

What we do for our customers:We are proactively monitoring this situation. We are keeping current on all patches and updates that are being released. As they become available, we pass them along to your devices and network. We limit the coverage of your Wi-Fi networks to only intended area, thus reducing the vulnerability range. We follow all current Wi-Fi networking best practices.

What we recommend you do:Please limit sharing of any sensitive data. If you must do so on a Wi-Fi network, please leverage HTTPS encryption.  Look for your wireless device manufacturer's latest patches to combat this vulnerability.

Additional notes:Changing of Wi-Fi passwords will not reduce your vulnerability to KRACK attacks. Android and Linux devices are more at risk. iOS and Windows devices are vulnerable, but they are a little more difficult to exploit because of how they implemented the WPA2 standard.

If you have any questions, or need additional information, please don't hesitate to reach out to us.  http://bit.ly/2yxPjxm

Get in Touch

Contact The ProActive Technology Group today to discuss your IT needs.

The ProActive Technology Group
14 Plaza Rd
Greenvale, NY 11548
516.876.8200
info@ptg.co

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.