{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '40px' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

How To Fix A Hacked WiFi Network

by John Ciarlone on May 31, 2013

hacked wifiHack attacks have been big news in recent years.  Then, this year saw the term move into the geopolitical realm as it's been revealed that the US and China have had a minor cyberwar going on recently. Everyone is rightfully concerned about maintaining their business in the instance of a hack attack, and their WiFi network is one of the key weak points.

Most traditional WiFi access points have to partially let a user onto the network, before checking their credentials. Allowing hackers this foot in the door often leaves you open for attack, but so do human mistakes like sloppy password security procedures.

 Either way, if you discover your WiFi network has been hacked, you need to move quickly.

cisco security asaGetting On Top Of a Hacked WiFi Network

1 – Determine the scope of the intrusion.

As with any break-in, you need a list of everything that was stolen or tampered with. Your server records should have most of that information, along with details such as the IP address the attack came from. It's vital you capture this information ASAP. Most of your clues will be there, both to who did it and what was done to you.

At this point, two things need to happen, so these should be concurrent if at all possible:

2 – Find the source of the intrusion.

Your networking team should now be focused on one thing: finding how the intruder got into the system. There is a hole that needs to be plugged, as quickly as possible. This is especially true given the number of remote monitoring and controlling 'bots' there are in circulation right now. That hole in your WiFi network may be leaking your secrets as long as it stays open.

2b – Determine if you should go public.

For simplicity, let's say there are two basic questions you need to answer, and quickly.

Was any consumer data compromised?


What data protection regulations are involved?

If you're in a situation where the public should/must be advised of your attack, you will always look better the more quickly you come forward with it. Attempting to cover up an intrusion where any consumer data was compromised, even email addresses, is generally not a good idea. In many cases, it's outright illegal. Either way, if it becomes public anyway, it's a PR nightmare.

3 – Don't forget your follow through.data security

Beyond getting the initial attack and its effects handled, remember to address the initial cause of the problem. What changes in your procedures would have prevented the attack in the first place? If there was a human element involved, such as a stolen password, would more training on data security help? A legitimate good-faith effort to root out the problem helps you in the long run, as well as making you appear genuine in the public sphere.

You might even consider upgrading to distributed vWLAN networks, which remove virtually all the security holes that plague traditional WiFi access gates.

A WiFi Hack Attack Isn't The End Of The World

If you want a great guide to what to do and not do, look to Sony's performance in the wake of their 2011 hack attack: They were initially criticized for sitting on the information for a week, but then, they thoroughly addressed the problem, properly notified customers, and threw in a lot of freebies on top. Aside from waiting too long for disclosure, their response is often hailed as model.

There are solutions out there that can help reduce the risk.  Contact uswe can help you

explore the options. 


Topics: Wireless Access Points, Wireless