At any point in time, I can reach out and touch everyone's laptop at the hot spot, and there's usually not any way of preventing that -- from me touching and looking at other people's stuff at the hot spot itself. |
Basically, an evil twin is someone who masquerades as a hot spot. They send out a stronger signal, so instead of connecting to the Internet via the hot spot, your computer connects to the evil twin. He can take all your information directly. |
It's great to be able to sit somewhere and work without having any wires attached, no nothing attached, but you have that risk that it comes back to. |
Most organizations have spent millions to protect their physical locations and wired networks, but if you're not securing the airwaves, you're leaving the back door wide open for hackers. Wireless networks bleed across physical boundaries and can render internal networks vulnerable to attack. In our seminar series, we will share the secrets of hacking and provide businesses with the information they need to make smart decisions about how their organization will address the growing risks associated with wireless networking. |
There is a tremendous amount of critical and confidential information flying through the airwaves in the Georgia State Capitol. Our challenge is to keep this information secure while enabling wireless access. |
Understand that the information you're sending is very similar to standing up here in the park and shouting out all the information -- would I normally do that? |