Trusted networks are not always what they seem. Ask a hacker. They love your employees’ casual use of open wireless networks. Credit: Thinkstock Consider this typical scenario. One of your company employees has a meeting across town. They arrive a bit early and go into a local coffee shop to connect to their wireless network because there is an email they just have to send. They may have heard somewhere that “open” wireless networks are bad and we should not connect to them, but this email is really important. The employee composes the email and sends it and says, “nothing blew up, so it must not be as bad as I’ve heard.” So, is that right? Is it safe? How can you know?An open wireless network is one that does not have any wireless security protocol running on it. When you see your device’s list of wireless access points, these will show up with saying “open” instead of “secure” or the padlock icon is missing. Even if an open wireless network shows a webpage and asks an employee for a password upon connection, it is still an open network. Good examples of open networks are at hotels, airports and coffee shops. With holiday travel upon us, the frequency of using an open network may certainly increase as an employee sends off one last email before journeying home.Open networks are a hacker’s dreamLooking for convenience, your employees probably aren’t spending much time thinking about the easy connection to an open network, they just made on their mobile device. They need to know why open networks are dangerous. It is because our devices remember the connection. Not only do they remember these networks, they broadcast, looking for those trusted networks. It’s almost like your device is saying, “Here is a list of all the networks I trust.” Most of our devices have dozens or hundreds of these known ‘good’ networks that the device is constantly looking for – some are secured, but others are open. Hackers know about this behavior of our mobile devices and try to exploit it. There are several hacker tools that scan an area, looking for devices that are trying to connect to known networks. The hacker tool then pretends to be the network access point your device is looking for. Your mobile device will actually connect to the hacker tool, thinking it has connected to the hotel or airport network that you indicated was trustworthy several months previously. Where the open network issue comes in, is that if the hacker tool masquerades as a secured device, your phone/tablet will compare the previous certificate with the hacker tool’s certificate. Your device will notice that the certificates don’t match and will not try to connect. With an open network, there is no certificate, only the name. To open networks: forget you!The biggest danger of open networks doesn’t happen when an employee connects on purpose. It happens when their device continues to try to connect long after they have left the area. Long after they approved to connect to an open network, the device is still hard at work trying to connect to that network. So how do we fix this problem? It starts with educating employees and contractors that open wireless networks can be a great pathway for hackers, and attacks. Employees need to be instructed to go into their device and tell it to forget all the open networks. For Windows, Android devices and MacOS this is a matter of going to the network area, listing out the wireless networks and removing or “forgetting” the open networks. On the iPhone and iPad, they will need to perform a more dramatic reset of the network settings in order to remove all the open networks. Once they’ve done this, you can breathe a bit easier about your company’s vulnerability to open network attacks. Related content opinion IT service management: security’s best friend Your IT service management (ITSM) teams can serve up good security practices with your help. By Phil Richards Jul 11, 2018 6 mins IT Strategy IT Leadership Security opinion GDPR is live! – Now what? GDPR rules are a hot mess. Get clarity by further identifying all your GDPR weak spots. By Phil Richards Jun 08, 2018 5 mins Regulation Government Technology Industry opinion Nation state attacks – the cyber cold war gets down to business Cyber weaponry is moving to new frontiers: yours. Businesses are the next target on the nation state menu. Are you protected or vulnerable? By Phil Richards Apr 19, 2018 5 mins Cyberattacks Government Technology Industry opinion Getting to know your company’s risk appetite Your employees make risk/reward decisions daily. Have you defined risk boundaries for them? Unwanted risk or missed opportunities happen without clear direction. By Phil Richards Mar 16, 2018 5 mins Technology Industry Data and Information Security Privacy Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe