For Security Compliance, Organisations need to know:
- If they have any malicious WiFi networks in their organisation, including locations outside Head Office
- The location of any malicious WiFi networks so they can be found and shut down.
Organisations typically conduct adhoc or annual ‘floor walks’ trying to find malicious access points. This satisfies PCI DSS compliance at a particular point in time, but how do you find malicious access points the other 364 days of the year?
Note: Standards such as PCI DSS and NIST / CSC specifically require organisations to check for malicious WiFi networks.
LOCATIONS OUTSIDE HEAD OFFICE – BRANCHES, STORES, VENUES, HOSPITALS, CAMPUSES
Many organisations have public-facing operations outside Head Office, such as retail stores, bank branches, entertainment venues, hospitals and education campuses.
Where locations are used by the public and the organisation, it is difficult to have visibility over what is happening with WiFi and other wireless protocols.
For example, a malicious WiFi network could be set up to intercept Point of Sale data in a store or interfere with medical devices in a hospital.
INDUSTRIAL INSTALLATIONS AND REMOTE OPERATIONS
Utilities and Mining companies often operate remote sites with specialised industrial equipment or operational technology (OT).
These remote sites can easily be accessed by the public without the owner being aware. For example, a Mining company found that text messages were being sent from one of their remote sites where there were no staff – so who sent the text messages?
It is difficult to have visibility over what is happening with WiFi and other wireless protocols at these remote sites.
WiFi is commonly used for communications in maritime, air and road transport and is also often provided as a service to passengers.
Communications are critical for the safety of crew, cargo and passengers and ensuring their security is paramount. Passengers also demand WiFi and uptake is increasing.
As transport is publicly accessible, it is easy to set up a malicious WiFi network and difficult to have visibility without HackHunter.
INTERNET OF THINGS
Internet of Things (IoT) devices include medical (pacemakers, insulin pumps), communications (phone, laptop), autonomous vehicles and Smart City (street lights, traffic and waste management).
These devices communicate with their management and control systems using WiFi and other wireless protocols.
Visibility over their communications and ensuring they are not compromised will become even more important as they increasingly come into daily use.
GOVERNMENT INCLUDING DEFENCE
Government offices are accessed by the public and it is easy to set up a malicious WiFi network to steal information or launch a denial of service attack.
Government Departments have a duty of care to protect the public.
Defence has specific requirements for deployments and visibility over WiFi (and other wireless) communications at overseas Joint Bases is problematic.
Security of Defence WiFi communications is vital at all times and visibility over malicious actors is imperative.