If you are running wireless in the home or even in the workplace, you need to read more on this blog post.
The following news is taken from "Common Vulnerabilities and Exposures" (aka CVE) with the reference CVE-2017-13080. This may not be a website you recognise, but the IT industry refers to this for new information and this will list information for you on how to stay safe.
Cisco who provide routers and wireless access points to many businesses have responded with a bulletin and what steps to take. This was released 16th October.
This vulnerability affects all wireless devices from phones, tablets and computers. Microsoft, Google and Apple will release security updates (if you have not noticed them already).
We also have a YouTube video explaining many of these points and how Krack Attack works.
How do I stay safe?
The best advise is to liaise with your IT department or seek the help of a local IT company for more info. For home users, we advise you to keep all your IT devices (even mobile phones) up to date. If you go to your system settings, there will be an option to "check for updates".
We are helping businesses keep these IT safe and secure. If you would like to know more, please feel free to call our team on 01489 290 001.
This post was brought to you by Baldeep on 18 Oct 2017.
Baldeep started the company knowing that IT doesn't have to be your frustration. Baldeep continued developing his skillset and has multiple accreditations to his name including his degree, Microsoft Certifications, ITIL and VMware Data Center Virtualization Certification. He is always learning to move IT forward for your business.
Want to keep your IT on track? Claim today for access to our exclusive content and promotions. Not sure which IT service is best for your needs or your budget? Book an IT Audit, helping you Every BIT of the way.
As a bonus, we will also give you free updates once every 2 months to help you keep your IT on track.
Here are some recent posts from the team. If you have a post you would like added, please drop us an email.