Photo courtesy of holyroodpr.co.uk

Photo courtesy of holyroodpr.co.uk

Wireless network security levels were tested recently in Edinburgh Scotland by a cyclist who “war-biked” around the capital trying to find unsecured wireless networks which could be exploited by hackers.

Security expert James Lyne utilized a bike equipped with dynamos and solar panels to power a computer which scans for wireless networks which have no or poor security.

As our readers well know, hackers can join wireless networks and then become totally capable of directly attacking those computers and other devices to steal money or information. They can also track which websites you have visited, read emails and capture passwords.

Scottish Business Resilience Center

This information security focused project was organized by the Scottish Business Resilience Center (SBRC) — whose mission is to safeguard Scottish businesses.

The SBRC believes that thousands of businesses in Scotland have inadequate online security. Many use default network names, outdated security and sometimes completely unprotected networks.  They also are concerned that weak security policies and procedures also leaves householders open to attack, including from hackers who secretly download child abuse images to avoid detection on their own computers.

Mandy Haeburn-Little, Director of the SBRC, said: “One in three people in the UK was a victim of e-Crime in 2012 and one of the most common risks faced by businesses is poor IT security which potentially allows criminals to raid servers, steal identities and infiltrate bank accounts”.

Our staff believes that something can be learned from this project and perhaps then utilized as a benchmark reference for best practices by network security teams where they work, in the community where they live or certainly on their home computer networks.

Click here to view a video clip explaining how James Lyne conducted his network security surveillance while cycling around the streets of Edinburgh.

If applicable, please pass this information along to those information security and privacy control team members where you work and in the community teams where you live.

Pin It on Pinterest