Ruckus has just published a new e-book titled “Seven Network Access Security Risks—and How They Can Lead to a Data Breach.” It focuses on faulty network access security as a risk area that can lead to data compromise. As the title implies, this e-book outlines seven distinct risk areas that IT organizations should be aware of, especially when it comes to providing connectivity for BYOD and guest users.
As detailed in a previous Ruckus blog, “What’s wrong with PSKs and MAC authentication for BYOD?”, default methods of network onboarding and authentication have serious security flaws that can leave you open to data compromise. These security holes get less attention that more high-profile threats like ransomware, but the dangers are still very real. Sometimes it’s the attack surface that you aren’t thinking about that attackers seek to exploit.
Linking IT security risk
areas to the potential for a data breach
Sometimes the link between a threat vector and the risk of data
compromise is obvious. Keylogging malware tracks a user’s every keystroke,
including when they type in their username and password for cloud-based
business applications. Email phishing attacks compromise credit card numbers or
other sensitive data by tricking users into entering them into a website that
spoofs a legitimate site. Misconfigured cloud storage can leave sensitive data
just hanging out there on the web for attackers to steal. All of those are
obvious ways that attackers can get at your data.
Network access security is a category where the linkages may
be less obvious. The point of the new e-book is to help clarify the connection
between this risk area and a potential breach. It’s a highly accessible way to
increase your knowledge of this often-overlooked area of the IT security domain—a
five-minute read covering an underestimated attack surface in modern IT
environments. This document can help you keep other stakeholders in your
organization informed about the risks as well, so feel free to pass it along. We
should emphasize that no registration is required to …