Survey Finds Wireless Data Security Vulnerabilities In Retail Stores

As the 2007 holiday shopping season officially gets underway, AirDefense recently unveiled results from its comprehensive “2007 Retail Shopping Wireless Security Survey” of wireless data security and physical security practices in place at more than 3,000 stores nationwide and also in parts of Europe. Cities monitored were Atlanta, Boston, Chicago, Los Angeles, New York City, San Francisco, London and Paris. Research was conducted in some of the busiest shopping areas in the country, including: Rodeo Drive in Beverly Hills, Madison Avenue and 5th Avenue in New York City, Michigan Avenue in Chicago, Union Square and Market Street in San Francisco.

AirDefense discovered more than 2,500 wireless devices such as laptops, handhelds, and barcode scanners in use by retailers. Surprisingly, 85 percent of the devices could have been compromised or risk stolen data due to data leakage, mis-configured access points, poor naming choices for access points, outdated access point firmware and a “cookie-cutter” technology approach by large retailers. This type of approach occurs when the same technology is used in all retail locations so vulnerabilities will repeat themselves across the entire store’s chain.

Consequences of the wireless security vulnerabilities found in AirDefense’s “2007 Retail Shopping Wireless Security Survey” are difficult to quantify. However, unauthorized individuals with a desire to steal consumer information or retailer data are likely to look for the weakest link in the network, such as misconfigured access points. Some of the networks that were discovered were fresh out of the box, using default configurations and SSID (Service Set Identification), such as retail wireless, POS WIFI, or store#1234. This sends out a signal to someone with a desire to commit fraud that nothing has been changed on these devices and the entire wireless network. Data leakage occurs when companies add wireless functionality onto an existing wired network. Point-of-sale information on products and possibly consumer credit card information can leak onto the wireless airwaves and be stolen.

Also, as part of the “2007 Retail Shopping Wireless Security Survey,” AirDefense monitored nearly 5,000 access points, the hardware that connects wireless devices to wired computer networks. AirDefense discovered 25 percent were unencrypted while 74 percent were encrypted. Also, 25 percent of retailers use Wired Equivalent Privacy (WEP), one of the weakest protocols for wireless data encryption. Forty-nine percent were using WIFI Protected Access (WPA) or WPA 2, the two strongest encryption protocols for prevention against theft.

AirDefense also discovered that most retailers seem to maintain stronger physical security than wireless security as 95 percent of retailers had some form of physical security system in place such as an RFID security alarm. In addition, nearly 70 percent had security cameras installed and roughly 10 percent employed guards at exit doors.

“Our comprehensive survey shows a striking imbalance between wireless security and physical security best practices at mainstream retail stores,” said Mike Potts, president and CEO, AirDefense. “Retailers today are much more adept at preventing or minimizing shoplifting by using a layered security approach, but the same can’t be said for wireless security, where misconfigured or unencrypted access points were evident in every city.”

The most common data security lapses involved misconfigured access points that open backdoors to data. On several occasions, larger retailers had configured access points to work with WPA but had not switched off WEP, the weakest wireless security protocol. In addition, many retailers use their store name in the SSID, the name assigned by the equipment vendor to the wireless network during installation giving away a retailer’s identity. SSID’s can easily be reconfigured but often times are not.

Also, large retailers often times use the same security technologies at all locations nationwide, so one security vulnerability in New York is also visible in Los Angeles or Atlanta. Data leakage, involving unencrypted data and encrypted data, was also visible in addition to protocols such as IPX, NetBIOS and SNA, proprietary protocols that let devices communicate across different networks.

“Retailers around the country are leaving the ‘proverbial’ barn door open for potential problems should unauthorized individuals desire to steal consumer credit card information and point-of-sale information,” said Richard Rushing, the survey organizer and chief security officer, AirDefense. “Protecting consumer and retailer information is the most important job for retailers. A layered wireless security approach is the only way to prevent proprietary information from disappearing.”

Featured

  • Data Driven, Proactive Response

    As cities face rising demands for smarter policing and faster emergency response, Real Time Crime Centers (RTCCs) are emerging as essential hubs for data-driven public safety. In this interview, two experts with deep field experience — Ross Bourgeois of New Orleans and Dean Cunningham of Axis Communications — draw on decades of operational, leadership and technology expertise to share how RTCCs are transforming public safety through innovation, interagency collaboration and a relentless focus on community impact. Read Now

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.