{"id":15110,"date":"2015-10-22T17:08:47","date_gmt":"2015-10-22T17:08:47","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4680"},"modified":"2020-02-26T11:03:39","modified_gmt":"2020-02-26T16:03:39","slug":"wi-fi-and-macs-avoiding-trouble","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/wi-fi-and-macs-avoiding-trouble\/15110\/","title":{"rendered":"Wi-Fi and Macs: avoiding trouble"},"content":{"rendered":"<p>Apple users say their Macs are a more secure working tool than Windows-based PCs. Historically, UNIX-based systems were less popular among users and hackers, so today many end-users and businesses (especially SMBs) tend to think that using Macs make them totally secure, without any extra measures necessary.<\/p>\n<p>Unfortunately, it\u2019s not exactly true. Aside from the fact that OS X have its share of bugs \u2013 Apple patches them in numbers on a regular basis \u2013 there are also global, non-platform specific security issues.<\/p>\n<p>If you\u2019re only responsible for your own hardware, all you have to care about is your own bank cards and personal documents. But what if it is a corporate hardware that is regularly used within your company network?<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Wi-Fi and Macs: avoiding trouble #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fq6HJ&amp;text=Wi-Fi+and+Macs%3A+avoiding+trouble+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Most remote workers are\u00a0a potential vulnerability in a corporate network. An infected device authenticated within the network puts the entire network at risk, possibly ringing alarms for the entire IT staff and security service (not just IT security) in the company.<\/p>\n<p><strong>How<\/strong> <strong>it<\/strong> <strong>happens<\/strong><\/p>\n<p>A weekday morning. You\u2019re in your favorite coffee shop. You take your first sip of a coffee and you start waking up \u2013 finally. Then you open your laptop and check work e-mail, then social networks \u2013 of course. A nice beginning. Coffee\u2019s good too (keep in mind, though, that doctors don\u2019t recommend exceeding four cups a day). Ah, yes, there\u2019s a transaction to be completed before the end of the day.<\/p>\n<p>But there\u2019s a problem: most likely you\u2019re using an open \u2013 i.e. public \u2013 Wi-Fi.<\/p>\n<p><strong>Pitfalls<\/strong><\/p>\n<p>Wi-Fi networks in the caf\u00e9 and other public places are usually secured in following ways:<\/p>\n<ol>\n<li>None. Unfortunately. So within the hotspot range (10-40 yards) it\u2019s no big deal for a crook to intercept your traffic with whatever confidential data it contains. The bad guy doesn\u2019t even have to be in the same room with you.<\/li>\n<li>WEP (Wired Equivalent Privacy). A temporary key is used to encrypt the traffic. By analyzing 8-10 thousands of packets, a hacker can access next to any of the transmitted data.<\/li>\n<li>WPA and WPA-2. Encryption is conducted with an individual key generated for every user It supports TKIP and CCMP encryption technologies. WPA is the best way of securing traffic<\/li>\n<\/ol>\n<p>Regardless, there\u2019s no guarantee that you are completely secure, even if WPA\/WPA-2 is used. There is a multitude of ways for hackers to access all of the data transmitted.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>There\u2019s no guarantee that you are secure on a public WiFi, even if WPA\/WPA-2 is used. #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fq6HJ&amp;text=There%26%238217%3Bs+no+guarantee+that+you+are+secure+on+a+public+WiFi%2C+even+if+WPA%2FWPA-2+is+used.+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Some wildlife examples<\/strong><\/p>\n<ol>\n<li>You send an e-mail with the quarterly finance report to your colleague. If there\u2019s an attack going on, it is a malefactor who receives this report first; he then proceeds with reading and altering it then sends it on its way. Your colleague receives incorrect\u00a0data, thinking that it is you who sent it.<\/li>\n<li>While you are connected to an open Wi-Fi, the malefactor retrieves your MAC-address, alters it and accesses your corporate network. Then it is all up to this network internal architecture, of course (i.e. how it is secured and segmented), but the first entry point is reached.<\/li>\n<\/ol>\n<p>These are not the only possible scenarios, but we\u2019ll try to secure ourselves.<\/p>\n<p><strong>Bolt and bar the shudder\u2026<\/strong><\/p>\n<p>Automating the employees\u2019 security is better than running hours-long, exhausting drills on security. And we do our best to help here. In the latest version of Kaspersky Small Office Security suite OS X-based PCs are protected as well.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/advert\/small-office-trial?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_blo_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Small Office Security<\/a> includes:<\/p>\n<ul>\n<li>Protection for Windows and Mac-based PCs and file servers from various malware.<\/li>\n<li>Protection from phishing and other web-borne threats.<\/li>\n<li>Security for smartphones and tablets, including anti-theft tools: sensitive data shouldn\u2019t fall in wrong hands, and the devices are costly too.<\/li>\n<li>Additional protection for financial transaction \u2013 Safe Money technology.<\/li>\n<li>Protection from sensitive data leaks (including the information on clients). Such leaks always damage the reputation.<\/li>\n<\/ul>\n<p>Managing is simplified so much that even a non-tech-savvy employee will be able to figure out how to handle it quickly and easily. But, if there is the necessity for external expertise, Kaspersky Small Office Security also supports remote connections.<\/p>\n<p>Our solution for larger companies \u2013 <a href=\"https:\/\/www.kaspersky.com\/business-security\/endpoint-mac\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Mac<\/a> \u2013 has recently reached version 10. It includes:<\/p>\n<ul>\n<li>Continuous protection and check on demand, using antimalware bases of Kaspersky Security Network cloud service and other technologies.<\/li>\n<li>Protection from the network attacks.<\/li>\n<li>Protection of data transmitted via HTTP and HTTPS in Safari, Google Chrome and Firefox web browsers.<\/li>\n<li>Automatic updates of antivirus bases.<\/li>\n<li>Remote management of security settings via Kaspersky Security Center.<\/li>\n<li>Antiphishing module.<\/li>\n<\/ul>\n<p>Per\u00a0users\u2019 requests a number of other features were added, such as installation without GUI, support for installation via Casper Suite \u2013 a third-party solution for OS X and iOS management, activation of local key via command line, and OS X 10.11 (El Capitan) support.<\/p>\n<p>Installation is straightforward:<\/p>\n<ol>\n<li>Launch the installation package<\/li>\n<li>Follow the installation master instructions<\/li>\n<\/ol>\n<p>For other ways of installation please visit our <a href=\"http:\/\/support.kaspersky.com\/12331\" target=\"_blank\" rel=\"noopener\">Knowledge base<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple users say their Macs are a more secure working tool than Windows-based PCs. Unfortunately, it&#8217;s not exactly true.<\/p>\n","protected":false},"author":674,"featured_media":15499,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2349,503,34,1946],"class_list":{"0":"post-15110","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-kaspersky-endpoint-security--mac","10":"tag-kaspersky-small-office-security","11":"tag-mac","12":"tag-macos"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/wi-fi-and-macs-avoiding-trouble\/15110\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/wi-fi-and-macs-avoiding-trouble\/15110\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/wi-fi-and-macs-avoiding-trouble\/15110\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/kaspersky-endpoint-security-%d0%b4%d0%bb%d1%8f-mac\/","name":"Kaspersky Endpoint Security \u0434\u043b\u044f Mac"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15110"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15110\/revisions"}],"predecessor-version":[{"id":33584,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15110\/revisions\/33584"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15499"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}