Coworking Spaces and Cybersecurity

In Coworking, Cybersecurity by Collision

Elevated levels of cyber threat activity in the U.S. today require a relationship between coworking spaces and cybersecurity systems. In other words, the open-access wifi at places like coffee shops, libraries, and restaurants are no longer an option for today’s remote employee, entrepreneur, or student who has access to critical business resources. Every day, there are over 15,000 malware network attacks. With this frequency, user accounts, applications, processes, and other network elements are all subject to hacking. Attackers are using other people’s computers, devices, and NETWORKS to carry out their malicious plans. To augment this type of attack, hackers are utilizing network access tools that do not raise a flag on user devices. After all, the longer they have access to a device, the more data they can steal and use. 

Coworking buyer beware: Not all cybersecurity is the same, and not all of it is designed to protect you, the user.

coworking mobile security

How can you protect a computer or device from malicious network activity while using Wi-Fi?

It’s a question that many wi-fi users are asking. The first step is to understand the wi-fi threats and how they can impact YOUR business and device if the network is not secured properly.  Here are the most common wi-fi threats and scenarios to be aware of and understand before signing up to join a coworking space or logging onto a public wi-fi at a coffee shop.

  1. Rogue Access Point. A Rogue Access Point is a wireless access point that is connected to the secure wired network with the potential to allow access to your network and your resources. The good news: It’s detectable. As long as your wi-fi provider has a rogue access point detection system in place to identify rogue access points and send an alert to the IT team.
  2. Lack of a Next Generation Firewall. Next-generation firewalls incorporate multiple aspects of security, instead of just the basic, traditional firewall protection. They go beyond blocking unauthorized end users and enable network admins to designate safe user groups and usernames. They can also offer intrusion protection and detection, URL web filtering, and SSL traffic decryption/inspection. Next-generation firewalls are critical to limiting user access to a network and setting up guest networks to keep rogue users away. 
  3. DDoS Attacks. These network attacks are so common that the FBI has assembled an active task force and started seizing domains last year (TechCrunch). A DDoS attack “is a simple but effective cyber attack in which millions of machines are told to constantly bombard a specific server with traffic”(Mashable). One of the most devastating qualities of a DDoS attack involves ransomware and websites that are held hostage until payment is received. If your company is exposed to a DDoS Attack similar to what MeetUp.com experienced, will your company survive? 
  4. Hotspot Honeypot. Hotspot Honeypot is a strategy that gives attackers the ability to attract users to their own network, rather than the intended wi-fi network at the local coffee shop, mall, or airport. According to the InfoSec Institute, “Once this has been accomplished, the potential to commit various cybercrimes is quite high, such as hacking into bank accounts, launching ransomware attacks, the theft of personal and confidential data, and business email attacks.”

Setting Up Your Defenses: Know The Wi-Fi Environment

Now that you’re familiar with the threats that can come together to hurt your device or your business, you’re probably wondering how to verify the security protocols of the wi-fi networks you’ve been using. The first step is to call and talk to someone in the IT department. Any business or coworking space should have the ability to explain how their secure wi-fi solutions can protect you, the user. If no one calls you back or the IT contact can’t name a system used for protection, it’s time to move on or look into a personal solution.

Personal solutions range from user-friendly security protection to mobile web applications that allow you to quickly and easily set up wireless networks from any smartphone or tablet no matter where you’re working.

Multi-factor authentication systems can keep your data safe. Entrust Dataguard offers an adaptive, real-time authentication solution.

To learn more about secure wi-fi, visit Watchguard and download their resources: Watchguard Secure Wi-Fi.

Are you an educator or student? Eduroam offers a roaming service, allowing users to use wi-fi instantly and securely.

Asking about the wi-fi is the first step toward protecting your information, your device, and your company. If a coworking space or cafe is dedicated to protecting users on their network, they’ll be eager to share the name of the platform or company that protects their environment.