{"id":158,"date":"2019-03-05T12:49:45","date_gmt":"2019-03-05T12:49:45","guid":{"rendered":"https:\/\/blog.eventscase.com\/?p=158"},"modified":"2022-07-05T10:59:46","modified_gmt":"2022-07-05T08:59:46","slug":"protecting-your-event-wi-fi-in-five-simple-steps","status":"publish","type":"post","link":"https:\/\/eventscase.com\/blog\/protecting-your-event-wi-fi-in-five-simple-steps","title":{"rendered":"Protecting your Event Wi-Fi in Five Simple Steps"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Events have now become reliant on technology to function at optimal levels. <span class=\"rojo negrita\"> as well as for powering the organisers\u2019 own devices, which makes it a prime target for potential hackers.<\/span><\/span><span style=\"font-weight: 400;\">Event managers are right to be fearful of attacks on their connections, but no technology, router or measure can offer 100% protection against threats. If anything, there is a strange level of reassurance from the fact that cyber criminals are becoming more sophisticated and unpredictable; if they really want to bring a service down, there isn\u2019t a lot you can do.<\/span><\/p>\n<p><span class=\"azul-ec negrita\" style=\"font-weight: 400;\">Despite the threats, it is possible to run a secure wi-fi connection<\/span> and this should now form part of any event strategy, especially given that many attacks happen as a result of negligence by the organiser.<\/p>\n<h2>The usual suspects<\/h2>\n<p><span style=\"font-weight: 400;\">Wi-fi attacks are common and take many different forms. A MiTM incident (short for \u201cman in the middle\u201d) sees the <span class=\"rojo negrita\"> The criminal has a few options with this tactic, but the end goal is to connect the user to a malicious network, where sensitive data can be lifted.<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\">You may also recognise the denial-of-service attack, where hackers overload a network by sending a flood of messages towards it. The network then becomes unavailable due to its crashing under the weight of the requests.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-157 size-medium\" src=\"https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Concentrated-young-hacker-in-glasses-stealing-money-from-different-credit-cards-sitting-in-dark-room-300x200.jpeg\" alt=\"-\" width=\"300\" height=\"200\" title=\"-\" srcset=\"https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Concentrated-young-hacker-in-glasses-stealing-money-from-different-credit-cards-sitting-in-dark-room-300x200.jpeg 300w, https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Concentrated-young-hacker-in-glasses-stealing-money-from-different-credit-cards-sitting-in-dark-room-768x512.jpeg 768w, https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Concentrated-young-hacker-in-glasses-stealing-money-from-different-credit-cards-sitting-in-dark-room-945x630.jpeg 945w, https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Concentrated-young-hacker-in-glasses-stealing-money-from-different-credit-cards-sitting-in-dark-room-90x60.jpeg 90w, https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Concentrated-young-hacker-in-glasses-stealing-money-from-different-credit-cards-sitting-in-dark-room.jpeg 1000w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The best way to protect your network is by undertaking small yet vital measures to ensure your name stays off the criminals\u2019 radar. Here are some easy methods of keeping your own house in order:<\/span><\/p>\n<h2>Change your wi-fi details<\/h2>\n<p><span style=\"font-weight: 400;\">One of the most common mistakes is made by allowing the wi-fi\u2019s credentials to be altered. Every connection has a login function, meaning every connection provides a chance for an attacker to guess its username and password.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can save yourself a lot of problems by switching basic details like &#8220;admin&#8221; and &#8220;1234&#8221; with something a bit more specific. Think about a term that only you could guess, or consider the use of random password generator for something really obscure.<\/span><\/p>\n<p><b><img decoding=\"async\" class=\"aligncenter wp-image-156 size-medium\" src=\"https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Privacy-Concept-on-Folder-Register-in-Multicolor-Card-Index.-Closeup-View.-Selective-Focus.-3D-Render.-300x169.jpeg\" alt=\"-\" width=\"300\" height=\"169\" title=\"-\" srcset=\"https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Privacy-Concept-on-Folder-Register-in-Multicolor-Card-Index.-Closeup-View.-Selective-Focus.-3D-Render.-300x169.jpeg 300w, https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Privacy-Concept-on-Folder-Register-in-Multicolor-Card-Index.-Closeup-View.-Selective-Focus.-3D-Render.-768x432.jpeg 768w, https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Privacy-Concept-on-Folder-Register-in-Multicolor-Card-Index.-Closeup-View.-Selective-Focus.-3D-Render.-107x60.jpeg 107w, https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Privacy-Concept-on-Folder-Register-in-Multicolor-Card-Index.-Closeup-View.-Selective-Focus.-3D-Render..jpeg 1000w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/b><\/p>\n<h2>Hide each user\u2019s identity<\/h2>\n<p><span style=\"font-weight: 400;\">When hackers can see who\u2019s connected to the wi-fi network, it is possible for them to launch a MiTM attack. Each connection should be administered by someone with enough technical knowledge to prevent this from happening. So long as you\u2019ve requested a way for everyone\u2019s identities to be concealed, you\u2019ll have taken care of the situation on your side.<\/span><\/p>\n<h2>Gain protection against ARP spoofing<\/h2>\n<p><span style=\"font-weight: 400;\">Public wi-fi connections are highly susceptible to ARP spoofing, which refers to the act of tricking a computer to send data to a hacker\u2019s machine, as opposed to the router.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These attacks have been the downfall of many public wi-fi networks, although some routers are built in a way that prevents them from happening. You should, therefore, ask the venue if they have pre-configured settings in the network to evade such attacks.<\/span><\/p>\n<h2>Operate with multiple networks<\/h2>\n<p><span style=\"font-weight: 400;\">Given that your technology is constantly at risk from the dark forces, you should always aim to limit, rather than avoid, your chances of succumbing to complete disruption.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A method of risk aversion for events is to <span class=\"rojo negrita\"> one for general use by attendees, and the other for devices which help with tasks like registration and image projection. This does not reduce the chance of a network being compromised, but it can prevent hackers from causing problems in more than one area.<\/span><\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-155 size-medium\" src=\"https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Security-concept-Lock-on-digital-screen-illustration-300x240.jpeg\" alt=\"-\" width=\"300\" height=\"240\" title=\"-\" srcset=\"https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Security-concept-Lock-on-digital-screen-illustration-300x240.jpeg 300w, https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Security-concept-Lock-on-digital-screen-illustration-768x614.jpeg 768w, https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Security-concept-Lock-on-digital-screen-illustration-788x630.jpeg 788w, https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Security-concept-Lock-on-digital-screen-illustration-75x60.jpeg 75w, https:\/\/eventscase.com\/blog\/wp-content\/uploads\/2019\/03\/Security-concept-Lock-on-digital-screen-illustration.jpeg 1000w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<h2>Make logs for each connection<\/h2>\n<p><span style=\"font-weight: 400;\">Provided that someone is making a note of all the people connected to the wi-fi, it becomes very easy for them to see if anyone is accessing a malicious website. This is the kind of proactive move which can prevent attacks at the earliest opportunity, before they can really get started.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019ll reserve a final mention to the importance of having a trained IT worker to monitor these logs and look out for any suspicious movements. Some venues will have personnel whose role involves the maintenance of wi-fi among other tasks relating to network security. In the same way that you wouldn\u2019t run a busy event without staff or security, you shouldn\u2019t leave your wi-fi unattended.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Events have now become reliant on technology to function at optimal levels. as well as for powering the organisers\u2019 own devices, which makes it a &hellip; <\/p>\n","protected":false},"author":7,"featured_media":830,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pgc_meta":"","footnotes":""},"categories":[1],"tags":[25,26],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/eventscase.com\/blog\/wp-json\/wp\/v2\/posts\/158"}],"collection":[{"href":"https:\/\/eventscase.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eventscase.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eventscase.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/eventscase.com\/blog\/wp-json\/wp\/v2\/comments?post=158"}],"version-history":[{"count":25,"href":"https:\/\/eventscase.com\/blog\/wp-json\/wp\/v2\/posts\/158\/revisions"}],"predecessor-version":[{"id":831,"href":"https:\/\/eventscase.com\/blog\/wp-json\/wp\/v2\/posts\/158\/revisions\/831"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eventscase.com\/blog\/wp-json\/wp\/v2\/media\/830"}],"wp:attachment":[{"href":"https:\/\/eventscase.com\/blog\/wp-json\/wp\/v2\/media?parent=158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eventscase.com\/blog\/wp-json\/wp\/v2\/categories?post=158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eventscase.com\/blog\/wp-json\/wp\/v2\/tags?post=158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}