Convenient Wi-Fi Availability Just Another Access Point for Data Thieves

(AP Photo/Damian Dovarganes) (AP Photo/Damian Dovarganes)

NU Online News Service, June 14, 2:43 p.m. EDT

Schools, libraries, airports, hotels: most of these heavily trafficked venues now offer convenient Wi-Fi access to hundreds of employees and patrons, and unintentionally offer hackers potential access to scores of personal information.

However, your cozy local café could be the hottest spot for cyber-attacks on unsecured networks, says a Travelers executive.

There were 515 million records breached in theU.S.in 2010, reports the Privacy Rights Clearinghouse (PRC), and another study finds that the average data breach that year cost $7.2 million.

Small businesses may not carry that kind of weight in user data, but they also often overlook the risk-management methods that can stop cyber attacks in their tracks. 

“Small businesses don’t have the resources to implement and operate sophisticated security procedures,” says Jason Glasgow, CyberRisk product manager for Travelers bond and financial products.

Criminals usually conduct their shady business by opening a portal through a server to access the Internet, says the risk specialist. If the portal lacks protective software, the criminal can access information about the company providing the connection, or can stay undetected within the network until an unsuspecting customer shares financial or personally identifiable information.

“The biggest expenses occur when companies unintentionally allow criminals access to patron information that is then used to commit identification fraud, and WiFi is just another avenue to get to that information,”Glasgow says. “Criminals can use an unsecure connection to conduct a cyber attack on the host or use it to attack other entities.”

The PRC says unencrypted networks, which don’t scramble user information as it is entered into the network, is prone to three major privacy threats: when a hacker intercepts a computer-router connection to collect and transfer data to his or her own computer; when the hacker uses a “sniffer” application to monitor and capture other’s logon details and credit card numbers; and old-fashioned over-the-shoulder snooping to eavesdrop login codes.

Businesses can provide WiFi safeguards by purchasing a secure network with an encryption service and regularly changing or rotating its password. Employees should monitor those receiving the network key by sharing it only with paying customers. A user agreement should always be posted on the sign-in page to limit the host’s liability. 

Further safety suggestions from the PRC include abstaining from conducting sensitive transactions over unsecured Wi-Fi networks, or utilizing a Virtual Private Network (VPN) that encrypts information on all Wi-Fi networks, whether already encoded or not.

On occasion, certain sites and e-mail servers such as Gmail offer a separate secured connection. The simple trick to access the link is to add an “s” to the beginning of a domain name (https://). 

Even the most stringent safety measures aren’t ironclad, so Travelers offers a suite of CyberRisk management liability products offering first- and third-party coverage for crisis management event expenses, security breach remediation expenses, data restoration, E-commerce extortion, and media liability, among other coverage options. 

About the Author
Anya Khalamayzer, PropertyCasualty360.com

Anya Khalamayzer, PropertyCasualty360.com

Anya Khalamayzer is Assistant Editor of Risk for PropertyCasualty360-National Underwriter. Khalamayzer graduated from CUNY Baruch College after intensive internships with Time Out New York Kids and Crain’s Investment News. Keenly interested in environmental science, music and the arts, her articles have been published in Gotham Gazette, Wonkster blog and Ear to Mind magazine. She can be reached at akhalamayzer@summitpronets.com

Comments

Resource Center

View All »

Complimentary Case Study: Helping achieve your financial goals By:...

Find out how a Special Investigation Union used TLOxp to save the company money and...

Do Your Clients Hold The Right CDL License?

Learn about the various classes of CDL Licenses and the industries that are impacted by...

Integrated Content & Communications: A Key Business Issue For Insurers

Insurers are renewing their focus on top line growth, and many are learning that growth...

High Risk Insurance Coverage in the E&S Market

Experts discuss market conditions, trends and projected growth in a rapidly changing niche.

Top E-Signature Security Requirements

This white paper covers the most important security features to look for when evaluating e-signatures...

EPLI Programs Crafted Just For Your Clients

Bring us your restaurant clients, associations and other groups and we’ll help you win more...

Is It Time To Step Up And Own An Agency?

Download this eBook for insight on how to determine if owning an agency is right...

Claims - The Good The Bad And The Ugly

Fraudulent claims cost the industry and the public thousands of dollars in losses. This article...

Leveraging BI for Improved Claims Performance and Results

If claims organizations do not avail themselves of the latest business intelligence (BI) tools, they...

Top 10 Legal Requirements for E-Signatures in Insurance

Want to make sure you’ve covered all your bases when adopting e-signatures? Learn how to...

Tech Digest eNewsletter

Technology related insights for insurance professionals including key developments, solution providers and news briefs from the carrier front – FREE. Sign Up Now!

Advertisement. Closing in 15 seconds.