With Gartner predicting global investment into 5G and wireless infrastructure to reach over $4 billion this year, the arrival of 5G and the further expansion of BYOD and IoT devices will no doubt increase data consumption and connectivity. Indeed, the demand for heightened security awareness and continuous security monitoring into the threats posed by wireless technology has never been greater.
However, according to a recent survey’s findings, 69 percent of security professionals admitted to not testing for malicious infections or known vulnerabilities within wireless devices on a weekly basis. This lack of visibility into the wireless airspace indicates that there is either a lack of clarity into wireless security threats or a severe oversight by organisations when it comes to their overall wireless security strategies.
Visibility remains one of the biggest issues in cybersecurity. What you can’t see can indeed hurt you. With higher levels of network traffic and more connected devices than ever, it highlights that current vulnerability assessments are not as extensive as they should be. Wireless threat detection is often ignored or addressed in a reactive manner.
The survey also asked respondents if their organisation has or requires any security authentication to initiate Bluetooth pairing or wireless connection to the network. Alarmingly, it was revealed that over half (51%) of enterprises lack pre-existing security controls to examine devices before they join the network. Additionally, almost a quarter (23%) of organisations do not have or are unsure as to whether they have a guest Wi-Fi network for non-employees.
Given the number of vulnerabilities within modern wireless and Bluetooth devices, if organisations continue to take a ‘head in the sand’ approach towards securing wireless networks, they are giving hackers the leverage they require to exploit the wider network infrastructure.
Hackers may only need minutes or days to infiltrate your corporate network. As organisations strive to reduce business disruption, it’s important to implement and integrate the necessary assessment tools to automate discovery and monitoring of wireless threats as part of the vulnerability management process. Many organisations we work with have delegated this problem to network engineers instead of treating it as the security problem which it is.