#9 CASE STUDY - WEAK WI-FI CONFIGURATION

WEAK WI-FI CONFIGURATION 

The password for the Wi-Fi? It’s simply the name of our street. 
 

COMPANY 

  • Sector: Services 

  • Size: 50 - 150 

  • Location: Wallonia  

FACTS & FIGURES 

  • 50 out of 55 users were affected. 

  • Actions taken to avert the incident: None 

  • How the business was affected: unauthorized access to confidential resources 

STORY 

Imagine a small-to-medium business in a vibrant neighbourhood in Wallonia. The space is friendly, open and so is the Wi-Fi. The password? The very name of the street right outside. Everyone around knows it. What’s the point of changing it? It’s always worked.  

But you know where this is going. A password that everyone knows would seem to pose an obvious risk. It also seems to put us on a slippery slope toward a world where the only secure password is one that we change every week and that, hopefully, we remember. 

A penetration test can be likened to a scheduled burglary. The objective is not to steal anything but to find weaknesses a real hacker might exploit. In this case, the weaknesses that were found during a routine test made it clear that the company was at risk from an internal threat. Anyone with basic skills could connect to the company's Wi-Fi and then... follow the infiltration plan. 

INCIDENT OVERVIEW 

A strong cybersecurity foundation relies on secure configurations. These configurations dictate not just how systems are set up but also how they're managed and connected. For your establishment to be secure, the boundaries of your network must be well defined. Yet many small businesses treat Wi-Fi security like a free lunch: it costs us nothing so far, and we don't miss it. Wi-Fi security is an important access point for your network. 

This place's devices were free, but they were set up badly. The Wi-Fi network was a weak entry point. The password was common knowledge among nearby businesses and possibly known to anyone who had ever seen the place, in person or online. Once hooked up, there was no special guest network for the people now sharing this internal space. And there was no monitoring or logging in place.  

BUSINESS IMPACT 

Unfortunately, an unsecured WI-FI network doesn't just create a risk of intrusion, it also means that malicious actors can exploit the entire network, which is defenseless overall and just waiting to be attacked.  

Once inside the network, it's possible to do a whole range of things, such as gain unauthorized access to resources without drawing attention to themselves, or retrieve sensitive information such as passwords or browsing sessions. 

Weak access controls can breach the requirements of the GDPR, NIS2, or ISO 27001. 

An insignificant misconfiguration can lead to a breach that causes clients to lose faith. 

SECURITY MEASURES 

Below you will find some ideas for setting up a secure network configuration: 

  • Modify the account settings of the Wi-Fi to have strong, unique passwords, and make sure to alter them with some frequency.  

  • Review and strengthen all related account settings regularly. 

  • For a secure Wi-Fi setup, the networks should be divided into segments by creating different VLANs for people of varying trust levels to use.  

  • Segments would exist for guests, employees, and those accessing critical sections of the infrastructure. 

  • Ensure that Wi-Fi security is implemented at the enterprise level by using 802.1X for the act of confirming user identity (authentication). 

  • Employ instruments such as Active Directory and Group Policy to administer configuration from a central location, ensuring consistent enforcement throughout the environment. 

RESOURCES 

 

Prêt à renforcer votre cybersécurité ?

Contactez-nous aujourd'hui pour discuter de la manière dont les services de Cresco peuvent aider votre organisation à se protéger et à sécuriser.

#8 CASE STUDY - SKIPPED SECURITY UPDATE 

See how outdated POS tablets brought a Walloon bakery chain’s payments to a standstill, just because updates kept getting postponed.

#7 CASE STUDY - NO SECURE CONFIGURATION PROCESS

Discover how a small Brussels dev team left itself wide open to attacks by skipping basic system setup standards.