Convenient Wi-Fi Availability Just Another Access Point for Data Thieves

(AP Photo/Damian Dovarganes) (AP Photo/Damian Dovarganes)

NU Online News Service, June 14, 2:43 p.m. EDT

Schools, libraries, airports, hotels: most of these heavily trafficked venues now offer convenient Wi-Fi access to hundreds of employees and patrons, and unintentionally offer hackers potential access to scores of personal information.

However, your cozy local café could be the hottest spot for cyber-attacks on unsecured networks, says a Travelers executive.

There were 515 million records breached in theU.S.in 2010, reports the Privacy Rights Clearinghouse (PRC), and another study finds that the average data breach that year cost $7.2 million.

Small businesses may not carry that kind of weight in user data, but they also often overlook the risk-management methods that can stop cyber attacks in their tracks. 

“Small businesses don’t have the resources to implement and operate sophisticated security procedures,” says Jason Glasgow, CyberRisk product manager for Travelers bond and financial products.

Criminals usually conduct their shady business by opening a portal through a server to access the Internet, says the risk specialist. If the portal lacks protective software, the criminal can access information about the company providing the connection, or can stay undetected within the network until an unsuspecting customer shares financial or personally identifiable information.

“The biggest expenses occur when companies unintentionally allow criminals access to patron information that is then used to commit identification fraud, and WiFi is just another avenue to get to that information,”Glasgow says. “Criminals can use an unsecure connection to conduct a cyber attack on the host or use it to attack other entities.”

The PRC says unencrypted networks, which don’t scramble user information as it is entered into the network, is prone to three major privacy threats: when a hacker intercepts a computer-router connection to collect and transfer data to his or her own computer; when the hacker uses a “sniffer” application to monitor and capture other’s logon details and credit card numbers; and old-fashioned over-the-shoulder snooping to eavesdrop login codes.

Businesses can provide WiFi safeguards by purchasing a secure network with an encryption service and regularly changing or rotating its password. Employees should monitor those receiving the network key by sharing it only with paying customers. A user agreement should always be posted on the sign-in page to limit the host’s liability. 

Further safety suggestions from the PRC include abstaining from conducting sensitive transactions over unsecured Wi-Fi networks, or utilizing a Virtual Private Network (VPN) that encrypts information on all Wi-Fi networks, whether already encoded or not.

On occasion, certain sites and e-mail servers such as Gmail offer a separate secured connection. The simple trick to access the link is to add an “s” to the beginning of a domain name (https://). 

Even the most stringent safety measures aren’t ironclad, so Travelers offers a suite of CyberRisk management liability products offering first- and third-party coverage for crisis management event expenses, security breach remediation expenses, data restoration, E-commerce extortion, and media liability, among other coverage options. 

About the Author
Anya Khalamayzer, PropertyCasualty360.com

Anya Khalamayzer, PropertyCasualty360.com

Anya Khalamayzer is Assistant Editor of Risk for PropertyCasualty360-National Underwriter. Khalamayzer graduated from CUNY Baruch College after intensive internships with Time Out New York Kids and Crain’s Investment News. Keenly interested in environmental science, music and the arts, her articles have been published in Gotham Gazette, Wonkster blog and Ear to Mind magazine. She can be reached at akhalamayzer@summitpronets.com

Comments

Resource Center

View All »

Get $100 in leads with $0 down!

NetQuote's detailed, real-time leads have boosted sales for thousands of successful local agents across the...

The Growing Role of Excess & Surplus Lines in Today’s...

The excess and surplus market (E&S) provides coverage when standard insurance carriers cannot or will...

Increase Sales Conversion with this Complimentary White Paper

This whitepaper will share proven techniques - used by many of the industry's top producers...

D&O Policy Definitions: Don't Overlook These Critical Terms

Unlike other forms of insurance where standard policy language prevails, with D&O policies, even seemingly...

Environmental Risk: Lessons Learned from Willy Wonka and the Chocolate...

Whether it’s a chocolate factory or an industrial wastewater treatment facility, cleanup and impacts to...

More Data, Earlier: The Value of Incorporating Data and Analytics...

Incorporating more data earlier in claims lifecycles can help you reduce severity payments by 25%*...

How Many Of Your Clients Are At Risk Of Flood?

Every home is vulnerable to flooding. Learn four compelling reasons why discussing flood insurance with...

Gauging your Business Intelligence Analytics Capabilities and the Impact of...

Big Data, Data Lakes and Data Swamps, How to gauge your company's Big Data readiness....

Extending Contact Center Capabilities Across the Insurance Enterprise

Today advancements in technology are making a big impact on business and society. To yield...

Drug and Alcohol Testing Requirements

In this two-part series, NBIS Risk Management team will break down the requirements to assist...

Tech Digest eNewsletter

Technology related insights for insurance professionals including key developments, solution providers and news briefs from the carrier front – FREE. Sign Up Now!

Advertisement. Closing in 15 seconds.