Banks 'leaking secret data via poorly secured Wi-Fi networks'

City Internet cafes are a potential mecca for corporate information spies.

Banks are leaking confidential information into public areas through poorly secured Wi-Fi networks, warns a security consultancy.

NTA Monitor said that it has recently been monitoring wireless network traffic in Internet cafs across the City of London, heart of the country's financial services industry.

It discovered dozens of organisations close to the cafes that are leaving wireless networks open to access by anyone outside their office. Many are either using no encryption or are relying on WEP, which NTA Monitor says can be cracked in as little as three seconds.

Outsiders can easily gain access to confidential emails, corporate intranets and data on banking or retail transactions, it warns.

"Some printer networks were also visible in public areas, which may prove attractive to an attacker who may be able to crash a printer network by sending multiple print jobs, more than the printer can handle," said Roy Hills, technical director at NTA.

"For a malicious user wishing to connect to a corporate network, the City seems to be an ideal location for an attacker sitting in a wireless-enabled caf," he added. "If a stranger walks into an office and connects to your network, it's quite likely that they'd be challenged by someone working there. But by sitting in a caf with a laptop they're pretty inconspicuous and probably out of sight of the office whose network they're connecting to."

He says NTA recommends that organisations implement and update secure configuration policies for laptops and other corporate mobile devices and ensure wireless networks are isolated with strong encryption, such as WPA.

"It's incredible that banks would allow themselves to be open to this level of risk," said Mike Hydra, founder of wireless consultancy 2Fast4Wireless. "But clearly this is an area they need to work harder on."

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

Data breach exposes widespread fake reviews on Amazon
data breaches

Data breach exposes widespread fake reviews on Amazon

7 May 2021
TsuNAME vulnerability could enable DDoS attacks on major DNS servers
distributed denial of service (DDOS)

TsuNAME vulnerability could enable DDoS attacks on major DNS servers

7 May 2021
What are SSH keys?
cyber security

What are SSH keys?

7 May 2021
Google’s about to push everyone into two-factor authentication
Security

Google’s about to push everyone into two-factor authentication

6 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021