OUR THOUGHTS ON:

Borrowing + Wireless = Hacking

Risk Advisory/Internal Audit

By Karen McCash

A residential homeowner mentioned something to me recently that was both alarming and share-worthy! Periodically, an SUV would park at the end of their driveway, and with laptop in hand, the driver would bang away on the keyboard. At my suggestion, when the SUV appeared again, the homeowner disconnected the residential wireless router, and the SUV quickly drove away.

We will never know the truth behind the hard-working SUV owner; but the scenario described should serve as a reminder to all of us about the risks associated with the use of wireless internet/intranet networks.

It is true that the internet has provided us a means to streamline our lives by providing access to a vast amount of information. But this convenience provides a simple vehicle for opportunity. An individual pirating your wireless network could access unethical websites, perform illegal activities and/or acquire sensitive data, which would be traced back to your computer via your network address registered in your name. Network addresses are similar to driver’s license numbers or social security numbers…the owner is identifiable. And there is a high probability that you will be held responsible for the activity.

Common utilities and software exist; some free of charge that easily allows hijackers to pirate your login. However, recognize that no system of control is fail-proof. Below are some simple practices to ward-off wireless hijackers:

  1. Educate yourself on the threats and practices. The hackers’ motto: “ignorance is bliss.” Being uninformed is an invitation.
  2. Know what technology you are using and whether the technology is current or dated.
  3. Change commonly known factory configuration settings:
    1. Administrator password
    2. SSID
  4. Disable SSID broadcasting
  5. Use the strongest encryption available for your computer.
  6. Use router firewalls.
  7. Change your passwords frequently.
  8. Keep your antivirus and firewall software on all computers attached to the network up to date.
  9. Strategically position the router to reduce access points from intruders outside of the home/business (signal will carry only so far, so be aware of how far your signal travels).
  10. Take the router access point down during periods of infrequent or non-use.
  11. Be proactive - observe your surroundings.

It is critical that you are vigilant in protecting access and monitoring threats.

© 2013 Schneider Downs. All rights-reserved. All content on this site is property of Schneider Downs unless otherwise noted and should not be used without written permission.

This advice is not intended or written to be used for, and it cannot be used for, the purpose of avoiding any federal tax penalties that may be imposed, or for promoting, marketing or recommending to another person, any tax related matter.

 

You’ve heard our thoughts… We’d like to hear yours

The Schneider Downs Our Thoughts On blog exists to create a dialogue on issues that are important to organizations and individuals. While we enjoy sharing our ideas and insights, we’re especially interested in what you may have to say. If you have a question or a comment about this article – or any article from the Our Thoughts On blog – we hope you’ll share it with us. After all, a dialogue is an exchange of ideas, and we’d like to hear from you. Email us at contactSD@schneiderdowns.com.

Material discussed is meant for informational purposes only, and it is not to be construed as investment, tax, or legal advice. Please note that individual situations can vary. Therefore, this information should be relied upon when coordinated with individual professional advice.

© 2018 Schneider Downs. All rights-reserved. All content on this site is property of Schneider Downs unless otherwise noted and should not be used without written permission.

comments