11.07.2015 Views

HIPAA Wireless Compliance Report - AirTight Networks

HIPAA Wireless Compliance Report - AirTight Networks

HIPAA Wireless Compliance Report - AirTight Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>HIPAA</strong> <strong>Wireless</strong> <strong>Compliance</strong> <strong>Report</strong>Severity 3 VulnerabilitiesSeverity Level: 3 Type: Medium Vulnerabilities: 8Potential Victim of Wi-Phishing Attack Count: 4Threat: In Wi-Phishing, hackers use common or factory-default SSIDs to lure clients to unwittingly connect totheir AP instead of the authorized WLAN. Clients probing for these common SSIDs are prime candidates for aWi-Phishing attack. This wireless vulnerability may lead to leakage of patient health data in violation of Section164.312(e)(1).Remediation: Locate the client and remove entries of vulnerable SSIDs from the clientâ€s preferred networkslist, so it does not probe for those networks. A wireless client management software can help in enforcing yoursecurity policies and regulating how your clients behave and connect wirelessly.Device(s) Involved:Location Device Name MAC AddressABC Corp Cisco-Linksys_01:4C:18 00:18:39:01:4C:18ABC Corp Intel_25:B8:48 00:13:CE:25:B8:48ABC Corp Intel_2B:EC:05 00:13:02:2B:EC:05ABC Corp Intel_92:0B:A6 00:19:D2:92:0B:A6Open External AP Count: 3Threat: External APs are not connected to your corporate network, but are in the wireless vicinity of your facility.Your authorized client devices are likely to connect to open external APs bypassing your security policy control(e.g., firewalls, and URL, spam and malware filters). This in turn can lead to reduced productivity, liability for illegalcontent flowing through your network, or leak sensitive data. This wireless vulnerability may lead to leakage ofpatient health data in violation of Section 164.312(e)(1).Remediation: Check the wireless settings on your authorized clients and ensure they are configured to connectonly to your authorized SSID. A wireless client management software can help in enforcing your security policiesand regulating how your clients connect wirelessly.If you do not want to touch your clients, consider using a wireless security solution for automatically blockingauthorized clients from connecting to external APs.Device(s) Involved:Location MAC Address Protocol SSIDABC Corp 00:15:E9:61:63:CA 802.11b/g Carib4ABC Corp 00:19:5B:8C:A8:0C 802.11b/g Load-GuestABC Corp 00:1E:58:23:BF:27 802.11b/g blueguestWEP Authorized AP Count: 1Powered by <strong>AirTight</strong> <strong>Networks</strong> Page 11 of 20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!