Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis Talks About WPA3.

Paulius Petretis, leading cyber security expert gives brief overview of the future Wi-Fi Protected Access 3 recently revealed at the Consumer Electronics Show in Las Vegas, while acknowledging that to those who value privacy it could be one of the sexiest announcements coming out of the show.

 Vilnius, Lithuania – January 17, 2018 – Paulius Petretis, CEO of VORAS Consulting posted a new blog on the company website entitled “New Wi-Fi Protected Access 3 Coming.”Mr. Petretis is all about helping companies keep their data protected and is anxious for the arrival of the new WPA3 with good reason.

Petretis writes, “Last year’s widespread KRACK attack made everyone and everything that uses Wi-Fi vulnerable.” He adds, “So, it comes as no surprise that a new wireless security protocol will be making its way into use.”

As Petretis points out, “The current Wi-Fi Protected Access 2 (WPA2) has been in place for nearly 14 years.” He continues adding, “While the announcement about WPA3 wasn’t necessarily the sexiest revelation at the recent annual Consumer Electronics Show (CES) in Las Vegas, to those of us in cyber security, it’s pretty relevant news.”

According to Petretis, “All the sexy new gadgets coming out will primarily be running on Wi-Fi, so that gives cyber criminals more ways to work their way into the lives of individuals as well as corporations.” “Keeping the criminals out is pretty sexy when you value your privacy and the privacy of important data,” says Petrits.

Here’s what we have to look forward to with WPA3, according to Naked Security,

The entire blog can be read at http://pauliuspetretis.freeua.agency/new-wi-fi-protected-access-3-coming/

 

Paulius Petretis

Paulius Petretis is an Information security expert, Certified Information Systems Security Professional (CISSP®), Certified Information Security Manager (CISM®), Certified Information System Auditor (CISA®), Certified in the Governance of Enterprise IT(CGEIT®) and Certified in Risk and Information Systems Control (CRISC®), Guest speaker at various conferences and seminars, Trainer at information security related training courses.

According to the annual survey initiated by the Info Security Europe, a whopping 93% of large organizations and 76% of small businesses had at least a single information security breach in 2011. Only 18% of the organizations affected by the infringements related to data protection laws had a consistent and effective contingency plan in place. According to Paulius, information is not something static – it evolves and mutates every day. It is the ecosystem of every business and if a single cell fails, it can bring down the entire business.

Therefore ensuring a consistent and up-to-date information protection policy must be the priority for all businesses – no matter how big or small they are. As it might be unrealistic to believe that any young or experienced entrepreneur can be the jack of all trades, the really smart decision is to rely on specialists who dedicate their professional lives to getting to know everything there is to know about protecting important business information.

With more than 16 years of experience in helping people, small businesses, and government organizations to protect their business secrets, Paulius believes that information security must help businesses achieve goals but not vice versa.

 

###

 

 

 

 

 

New Wi-Fi Protected Access 3 Coming

Last year’s widespread KRACK attack made everyone and everything that uses Wi-Fi vulnerable. So, it comes as no surprise that a new wireless security protocol will be making its way into use.

The current Wi-Fi Protected Access 2 (WPA2) has been in place for nearly 14 years. While the announcement about WPA3 wasn’t necessarily the sexiest revelation at the recent annual Consumer Electronics Show (CES) in Las Vegas, to those of us in cyber security, it’s pretty relevant news.

All the sexy new gadgets coming out will primarily be running on Wi-Fi, so that gives cyber criminals more ways to work their way into the lives of individuals as well as corporations. Keeping the criminals out is pretty sexy when you value your privacy and the privacy of important data.

Here’s what we have to look forward to with WPA3, according to Naked Security, “The main message is that under WPA3, security will be baked deeper into wireless configuration, making it harder to misconfigure or to avoid.” https://nakedsecurity.sophos.com/2018/01/10/wi-fi-security-overhaul-coming-with-wpa3/

They also report that four enhancements were mentioned: Brute-force resistance, IoT support, stronger encryption and safer public Wi-Fi.”

In the future, WPA3 will block authentication after several unsuccessful attempts, which, in theory, should help limit exposure caused by weak passwords. With the continual growth of the Internet of Things (IoT), Wi-Fi devices will allegedly be easier to configure using smart phones. In addition, government and business networks will gain access to “a 192-bit security suite, aligned with the Commercial National Security Algorithm (CNSA) Suite from the Committee on National Security Systems.”

In addition, nakedsecurity says, “The announcement mentions ‘strengthening user privacy in open networks through individualized data encryption,’ although it’s not absolutely clear what this refers to.” https://nakedsecurity.sophos.com/2018/01/10/wi-fi-security-overhaul-coming-with-wpa3/

 

All I have to say about the launch of WPA3 is, the sooner the better.

 

 

 

Director of VORAS Consulting, Cyber Security Expert, Paulius Petretis Talks Zombies.

Paulius Petretis, leading cyber security expert reveals how the IoT can turna company’s computers into zombies that can perform malicious tasks without the awareness of the owners.

 Vilnius, Lithuania – January 08, 2018 – Paulius Petretis, CEO of VORAS Consulting posted a new article on the company website entitled “When The Internet of Things (IoT) Turns Your Business Into A Zombie” in which Mr. Petretis cautions owners to be aware of the threat before deploying connected devices.

Petretis writes, “It may sound like the theme of the next Hollywood horror film. But, the fact is,” he says, “your business could have already become a Zombie without your knowledge.”

“You may wonder what exactly is a zombie?” says Petretis. He provides a lengthy definition from Wikipedia writing, “According to Wikipedia, “In computer science, a zombie computer is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to zombies. A coordinated DDoS attack by multiple botnet machines also resembles a zombie horde attack. Many computer users are unaware that their computer is infected with bots.” (https://en.wikipedia.org/wiki/Botnet)

 According to Petretis, “Having multiple interconnected devices is becoming more and more popular in homes and businesses throughout the world.” He continues adding, “It’s an exciting idea with a long list of seemingly desirable benefits. However, few people consider what could go wrong until something goes wrong.” Petretis provides an example. “For instance, back in the fall of 2016, there was a big attack on an Internet service provider in which a bunch of IoT devices became a botnet and made much of the Internet unavailable.”

The entire article can be read at http://pauliuspetretis.freeua.agency/when-the-internet-of-things-iot-turns-your-business-into-a-zombie/

 

Paulius Petretis

Paulius Petretis is an Information security expert, Certified Information Systems Security Professional (CISSP®), Certified Information Security Manager (CISM®), Certified Information System Auditor (CISA®), Certified in the Governance of Enterprise IT(CGEIT®) and Certified in Risk and Information Systems Control (CRISC®), Guest speaker at various conferences and seminars, Trainer at information security related training courses.

According to the annual survey initiated by the Info Security Europe, a whopping 93% of large organizations and 76% of small businesses had at least a single information security breach in 2011. Only 18% of the organizations affected by the infringements related to data protection laws had a consistent and effective contingency plan in place. According to Paulius, information is not something static – it evolves and mutates every day. It is the ecosystem of every business and if a single cell fails, it can bring down the entire business.

Therefore ensuring a consistent and up-to-date information protection policy must be the priority for all businesses – no matter how big or small they are. As it might be unrealistic to believe that any young or experienced entrepreneur can be the jack of all trades, the really smart decision is to rely on specialists who dedicate their professional lives to getting to know everything there is to know about protecting important business information.

With more than 16 years of experience in helping people, small businesses, and government organizations to protect their business secrets, Paulius believes that information security must help businesses achieve goals but not vice versa.

 

###