Businesses Improving Security Measures Of Wireless Access Points

The number of wireless access points -- including public hotspots and business networks -- continues to rise at an explosive rate in the world's major financial centers, as revealed by research commissioned by RSA, the security division of EMC. The survey's findings also indicate that the call for stronger security in wireless networks is starting to resonate among businesses.

The largest year-over-year increase in wireless adoption was found in London, where there are 160 percent more wireless access points than in 2006. The percentage increase in New York was a substantial 49 percent; and in Paris, 44 percent. Looking purely at business access points, London also leads, with a 180 percent leap over last year, as compared to jumps of 57 percent and 45 percent New York and Paris, respectively.

As measured by the use of either advanced encryption or Wired Equivalent Privacy (WEP), London experienced notable improvement in the security of business wireless networks over the last year. In contrast, security levels in New York and Paris improved only incrementally. In the course of the past year, use of wireless security measures in business networks increased as follows:

  • In London -- from 74 percent in 2006 to 81 percent in 2007.
  • In New York -- from 75 percent in 2006 to 76 percent in 2007.
  • In Paris -- from 78 percent in 2006 to 80 percent in 2007.

The survey results raise concerns about the continued use of WEP, despite awareness of its limitations, but traction in the use of more advanced encryption options is encouraging. Across all three cities there was significant use of advanced encryption, as measured by the implementation of 802.11i and Wi-Fi Protected Access (WPA). In London, 48 percent of the secured business access points detected had implemented advanced forms of encryption. In Paris the figure was lower, at 41 percent, and New York was comparable to London at 49 percent.

Yet as wireless access continues to become more pervasive, one-quarter to one-fifth of business wireless networks in three of the world's most important business centers remain wide open.

"As we evolve toward a 'wireless everywhere' world, we are witnessing enormous leaps in wireless connectivity, as highlighted by London's explosive growth in access points over the course of the last year," said Christopher Young, vice president for consumer and access solutions at RSA. "It is encouraging that almost half of all secured business access points are now using advanced forms of encryption, and we expect to see these numbers increase as awareness grows around the perils of operating inadequately secured wireless networks."

The survey also measured the number of wireless networks still configured according to default, out-of-the-box settings - which can make it easier for attackers to find ways to penetrate a network:

  • In London, 30 percent of access points still had default settings -- big slide backward from 22 percent last year.
  • New York improved slightly, with 24 percent of access points using default settings, down from last year's 28 percent.
  • Parisian businesses and consumers are least at risk, with 13 percent of access points displaying default manufacturer settings, down from 21 percent last year.

Public hotspots continue to proliferate in the many places where people seek connectivity, such as coffee shops, airports and hotels. Last year's research detected 364 wireless hotspots on the London route; by 2007 this figure had risen to 461 -- a 27 percent increase. In New York the annual growth rate was 17 percent, and 15 percent of all wireless access points were found to be hotspots -- by far the highest percentage across the three cities. In Paris, hotspots increased 37 percent and represented 11 percent of all access points.

Near these hotspots are significant numbers of unprotected business networks -- that are clearly not hotspots, but still offer access to those who might accidentally or intentionally connect to them. This has added a new and disturbing dimension to the wireless security problem; the massive growth of hotspots for mobile users means that there are large numbers of mobile users who frequently seek connections throughout their travels. This introduces an even greater threat to businesses operating wireless networks with little or no security. Fueled by the availability and profusion of hotspots, mobile users expect to find wireless networks -- and know how to connect to them.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities