Wi-Fi the weakest link in the IT infrastructure companies
FORTINET, a world leader in the production of high-performance solutions to cybersecurity, published a report Security Census 2015 dedicated to the safety of wireless networks. It shows m.in that decision makers on issues IT considers a Wi-Fi network for the most vulnerable element of the infrastructure network of the company. Responded as 49% of the respondents. For a comparison of core network indicated only 29% of respondents.
Insufficient protection of wireless networks raises concerns almost all in favour of managers. It (92%). This is hardly surprising when you consider that over 1/3 Wi-Fi networks in businesses that have internal employees, does not have a primary function of security, or authentication.
Other important conclusions from the study:
- 43% of respondents provide wireless networks of their companies access for guests, of which 13% in no way controls such access.
- Almost half of respondents (48%) think the loss of sensitive company data and/or customers for the highest level of risk associated with the use of unsecured wireless network.
- 72% of the companies approach to managing wireless infrastructure based on cloud computing, and 88% are considering the use of such an approach for deployments in the future.
Wireless networks vulnerable to threats
- Wireless infrastructure has been identified by the largest number of respondents (49%) as the most vulnerable to threats. Only 29% of respondents as the most vulnerable to the threats found the network core. Another 25% of the indicated database, 17% of the applications, and 11% of the storage system.
- As is apparent from the examination of the 37% of the respondents do not have even the most basic security of your Wi-Fi network, which is the authentication. A significant number of respondents, respectively, 29 and 39% of the security shall not be taken into account, such as firewalls and antivirus programs in their network security strategies.
- Other security considered crucial in protecting the main IT infrastructure also play a minor role in the implementation of a Wi-Fi network. For example, intrusion prevention system has implemented only 41% of respondents, application control 37%, and URL filtering only 29%.
- In considering the directions of the future development of their wireless networks, the majority of respondents stated that he intends to focus on the most commonly used, such as firewalls and authentication. Almost one-quarter (23%) as priorities identified and the solutions, such as intrusion prevention system (IPS), antivirus, application control and URL filtering.
Serious concern in connection with the insufficient protection of wireless networks
- 83% of respondents expressed their concern that their current wireless security are insufficient, and among the directors. it this percentage was up 92%.
- Global trust people responsible for taking the decision it issues to security for wireless networks is varied. At the top of the list of ranked China where 71% of respondents are "very concerned about". For comparison, in Japan, the percentage is 13%.
- The results show that the higher awareness of shortcomings in terms of security, the greater the concern. Respondents from countries where concerns are the largest (China and India), implement security on average more than respondents from countries where these concerns are the smallest (Italy and Japan).
The risk of data loss the greatest fear
- When asked to identify the risks associated with unsecured wireless network, 48% of respondents indicated a loss of sensitive data and/or customer data as the biggest threat to your business. Subsequently, the respondents identified industrial espionage (22%), non-compliance with industry regulations (13%), and joint disruption in the provision of services and exposure to compromise the reputation of the company (9%).
Cloud-based management has become the norm
- As is clear from the study, wireless infrastructure managed by the controller installed in the premises of the company goes to the past. Such controllers are now the least common form of management (28%).
- It is anticipated that the trend towards cloud-based management to continue, since only 12% of respondents do not consider the clouds for a good way to manage critical infrastructure.
- Of the respondents who positively relate to the cloud, 58% would like to use a private cloud infrastructure to manage your wireless networks, and 42% of the powierzyłoby is an external managed service providers. Out of respondents considering outsourcing, 14% fell below this step only provided that the services are hosted in the same country as the seat of their company. In turn, 28% would not have anything against the management of wireless networks in the public cloud, regardless of its geographic location.
A completely unsecured access for guests
- Almost half (43%) respondents, that provides access to the Wi-Fi for guests, but 13% of them in no way controls such access.
- The most common form of wireless access is access based on the temporary user name and password (46%), while a special portal with data authentication is used in 36% of cases.
Poll results show that despite the development of strategies in terms of the mobility of wireless security was not as yet a priority for businesses. As the threat type APT increasingly, achieving the goal of many points of vulnerability, and cloud computing has become widespread, businesses should no longer risk consequences of insufficient protection of Wi-Fi. We are glad that the decision makers. IT are waking up to the role played by wireless security in ensuring the protection of mission-critical business assets. Still, however, remains a lot of work to do. It departments still are looking for a balance between a high level of security and easy access. The Wi-Fi network must be part of an overall strategy to ensure the comprehensive protection of users and devices in both the wired and wireless - said John Maddison, Vice President of Fortinet.
A report commissioned by Fortinet has developed Lightspeed research company GMI. The development was founded on the basis of the results of the survey conducted among the people IT matters decision-making 1490 large enterprises from all over the world (with more than 250 employees). Przepytano security officers, directors. IT, technology or the main specialists. IT from 12 countries: Australia, Canada, China, France, Germany, India, Italy, Japan, Hong Kong, Spain, the United Kingdom and the United States.
Detailed results of the study, the methodology, infographics in JPG and PDF, as well as a photo of the quoted John Maddison are in the https://www.dropbox.com/sh/hqtiwpukyywfetf/AAAWKjlFtUCgHrukGotvlpS0a?dl=0
Learn more about our offer
We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.