
- Don’t panic. No, you do not need to turn off your Wi-Fi network. There have been no known attacks taking advantage of this vulnerability – yet.
- An attack would have to be very sophisticated using special hardware on-site. This limits the potential for concern.
- Disable the 802.11r protocol on your access point as it currently has a particular sort of vulnerability.
- Implement Best Practices.
- Your IT Support provider should already be installing the right firmware updates from your vendors as they become available. You must update both sides of the wi-fi connection – your “client” device (smartphone, laptop, tv, etc.) and the Wi-Fi Access Point (AP) you are connecting to.
- Note some clients Android 6 and Linux devices are more susceptible than others.
- Schedule a regular audit of your Wi-Fi network to ensure best practices are being applied.
- Enable Rogue Detection on your Access Points. This is a feature which detects and blocks devices pretending to be authorised.
- Separate Your Business wired network and your Wireless network.
- Implement RADIUS technology for more robust security authentication on your corporate network.
- Your IT Support provider should already be installing the right firmware updates from your vendors as they become available. You must update both sides of the wi-fi connection – your “client” device (smartphone, laptop, tv, etc.) and the Wi-Fi Access Point (AP) you are connecting to.
- Finally, until you are updated, only use sites and services that use HTTPS as they encrypt data from your web browser to the server and back.