Welcome!

News Feed Item

Spiceworks Study Reveals Recent Wi-Fi Attacks Challenge IT Professionals to Keep Corporate Data Secure

IT professionals identify IoT devices and public Wi-Fi networks as the biggest threats to Wi-Fi security

AUSTIN, Texas, Feb. 14, 2018 /PRNewswire/ -- Spiceworks today announced the results of a new survey that examines how businesses are securing their data and devices on corporate and public Wi-Fi networks. The results show IT professionals consider IoT devices the most vulnerable to Wi-Fi-based attacks, yet 50 percent of organizations have IoT devices connected to their Wi-Fi network. The findings indicate that although organizations are taking steps to increase Wi-Fi security, many IT professionals aren't confident in their ability to keep corporate data secure on IoT devices.

 (PRNewsfoto/Spiceworks)

Among IoT devices, 52 percent of IT professionals believe IP-enabled controllers, such as smart lights and thermostats, are very to extremely vulnerable to Wi-Fi-based attacks, followed by IP-enabled appliances (49 percent), video equipment (42 percent), and electronic peripherals (40 percent), such as connected projectors. Additionally, more than 35 percent of IT professionals believe wearables and sensors are highly vulnerable. However, according to Spiceworks research, only 36 percent of IT professionals are confident in their ability to respond to cyberattacks on IoT devices.

"While adoption of IoT devices is increasing in the workplace, many IT professionals are still wary of connecting these often un-patchable devices to corporate Wi-Fi networks," said Peter Tsai, senior technology analyst at Spiceworks. "To make matters worse, the recent revelation of Wi-Fi exploits, such as the WPA2 KRACK attack, have called security mechanisms into question that were once assumed to be relatively secure. As a result, some organizations are delaying the adoption of IoT devices and holding out hope that the forthcoming WPA3 protocol might improve Wi-Fi security."

Apple devices considered least vulnerable to Wi-Fi based attacks

The survey also revealed the perceived Wi-Fi risks associated with traditional computing devices is much lower, particularly among Apple products. Only about 19 percent of IT professionals believe Apple laptops, tablets, and smartphones are very to extremely vulnerable to Wi-Fi based attacks, compared to about 30 percent who believe Windows and Android devices are very to extremely vulnerable.

In terms of how organizations keep their wireless devices secure, the results show the majority of organizations use security protocols (e.g., WPA2), provide a separate Wi-Fi network for guests, implement strong passwords on networking devices, and use strong SSID network names. Fewer organizations encrypt data on their wireless networks (17 percent) or use digital certificates for Wi-Fi authentication (12 percent).

Nearly half of IT professionals believe corporate data is unprotected on public Wi-Fi

Although the vast majority of organizations provide employees with access to Wi-Fi in the office, the survey reveals employees in 61 percent of organizations connect company-owned devices to public Wi-Fi networks when working outside the office in hotels, airports, cafés, and other public places. However, 92 percent of IT professionals have concerns about the security risks of using public Wi-Fi on company-owned devices, and only 55 percent of IT professionals are confident their organization's data is adequately protected when employees connect to public Wi-Fi networks

In fact, 12 percent of organizations have experienced a security incident involving employees on public Wi-Fi while 34 percent aren't sure because incidents may have gone undetected or unreported. Additionally, only 63 percent of IT professionals are confident employees at their organization use a VPN when connecting company-owned devices to public Wi-Fi.

To help employees avoid using public Wi-Fi altogether, the results show 45 percent of organizations provide remote workers with mobile hotspot technology, but on average, only 13 percent of employees are remote, working outside of the office for a majority of their week. In other words, the results indicate that employees who occasionally use public Wi-Fi outside the office are often left unprotected.

The majority of IT professionals welcome any changes that might improve Wi-Fi security. In fact, in a recent Spiceworks poll, 53 percent of IT professionals are confident the upcoming WPA3 protocol will make Wi-Fi networks more secure.

Methodology
The Spiceworks survey was conducted in December 2017 and included 527 respondents from North America and Europe. Respondents are among the millions of IT professionals in Spiceworks and represent a variety of company sizes, including small-to-medium-sized businesses and enterprises. Respondents come from a variety of industries, including manufacturing, healthcare, nonprofits, education, government, and finance. The survey data was supplemented by poll data among IT professionals in the Spiceworks Community. For more information and a complete list of survey results, visit https://community.spiceworks.com/networking/articles/2941-data-snapshot-wi-fi-security-in-the-workplace-and-beyond.

About Spiceworks
Spiceworks is the platform that connects the IT industry to help technology buyers and sellers get their jobs done, every day. The company empowers the world's businesses to find, adopt, and manage the latest technologies while also helping IT brands build, market, and support better products and services. Founded in 2006 and headquartered in Austin, Texas, Spiceworks makes IT easy, and enjoyable, for everyone. For more information, visit http://www.spiceworks.com.

Connect with Spiceworks on Facebook: http://www.facebook.com/Spiceworks and follow us on Twitter: http://twitter.com/spiceworks.

Spiceworks is a registered trademark of Spiceworks, Inc. All other names may be trademarks or registered trademarks of their respective owners.

Media Contact:
Risa Kleen
Spiceworks
[email protected]

 

Cision View original content with multimedia:http://www.prnewswire.com/news-releases/spiceworks-study-reveals-recent-wi-fi-attacks-challenge-it-professionals-to-keep-corporate-data-secure-300598220.html

SOURCE Spiceworks

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
This session will provide an introduction to Cloud driven quality and transformation and highlight the key features that comprise it. A perspective on the cloud transformation lifecycle, transformation levers, and transformation framework will be shared. At Cognizant, we have developed a transformation strategy to enable the migration of business critical workloads to cloud environments. The strategy encompasses a set of transformation levers across the cloud transformation lifecycle to enhance ...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Ge...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
So the dumpster is on fire. Again. The site's down. Your boss's face is an ever-deepening purple. And you begin debating whether you should join the #incident channel or call an ambulance to deal with his impending stroke. Yes, we know this is a developer's fault. There's plenty of time for blame later. Postmortems have a macabre name because they were once intended to be Viking-like funerals for someone's job. But we're civilized now. Sort of. So we call them post-incident reviews. Fires are ne...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
CloudEXPO New York 2018, colocated with DevOpsSUMMIT and DXWorldEXPO New York 2018 will be held November 12-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI and Machine Learning to one location.
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of computational needs for many industries. Their solutions provide benefits across many environments, such as datacenter deployment, HPC, workstations, storage networks and standalone server installations. ICC has been in business for over 23 years and their phenomenal range of clients include multinational corporations, universities, and small busines...
This sixteen (16) hour course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will result in an improved ability to design, develop, deploy and operate software and services faster.
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Authorization of web applications developed in the cloud is a fundamental problem for security, yet companies often build solutions from scratch, which is error prone and impedes time to market. This talk shows developers how they can (instead) build on-top of community-owned projects and frameworks for better security.Whether you build software for enterprises, mobile, or internal microservices, security is important. Standards like SAML, OIDC, and SPIFFE help you solve identity and authenticat...
The digital transformation is real! To adapt, IT professionals need to transform their own skillset to become more multi-dimensional by gaining both depth and breadth of a wide variety of knowledge and competencies. Historically, while IT has been built on a foundation of specialty (or "I" shaped) silos, the DevOps principle of "shifting left" is opening up opportunities for developers, operational staff, security and others to grow their skills portfolio, advance their careers and become "T"-sh...