Are you aware of the dangers of free wi-fi? Hackers can use a rogue Wi-Fi access point to steal information from your private or office secure network.
By David Sarif and Natalie Tyler, Family Lawyers
New and advanced technology has drastically changed the practice of law. Technology has enabled lawyers to easily access, exchange, and provide information to the courts, opposing counsel, and clients. Given the demanding nature of our work, we as attorneys have been eager to learn to use new technology in order to be more productive and efficient. In the process, we have also put ourselves at risk of forgetting that certain technologies can actually pose a major threat to our practice – and to our clients.
Attorneys have an ethical duty to keep client-attorney communications and informational exchanges private and confidential. This duty has now expanded to cover staying up-to-date on knowing how to safeguard against hackers (or perhaps even unscrupulous opposing parties) who may try to gain unauthorized access to the information we store for our clients. By way of example, if a client gives you an engagement ring for safekeeping and you place it in an unlocked, open safe compared to one with a secure combination lock only you know the code to, where is it more likely to remain? Similarly, if you ignore the potential risks of using technology to access, share, and store tax returns, social security numbers, and bank statements by leaving them in a metaphorically unlocked, open safe, you cannot guarantee that your clients’ information will remain private and confidential.
The Dangers of Free Wi-Fi: Rogue Wi-Fi Access Points and Evil Twins
Hackers look for weak spots and vulnerabilities wherever they can be found. For example, they might try to use a rogue Wi-Fi access point, which could be installed on your private or office secure network without your knowledge or authorization. That’s one of the dangers of free wi-fi! Once installed, the person controlling it could potentially access your secured network and wreak havoc by stealing information or changing settings.
Imagine you invite the parties and attorneys involved in a very contentious case to your office for mediation. The opposing party with a little bit of know-how (perhaps from an online video), and fueled by emotion, installs a rogue Wi-Fi access point to your network while waiting in your lobby for mediation to start. Now that party has the ability to attack your secured network remotely, accessing your client’s information and any other information that may be stored on your network.
A hacker could create an “evil twin”: an unauthorized access point connected to an external network rather than your secure network. The evil twin appears to be a legitimate Wi-Fi access point offered by your office, but in reality, it has been set up to view information the user has not been authorized to view. For example, the hacker could create an access point and simply title it “XYZ Law Firm Wi-fi” (where XYZ is the name of a legitimate law firm).
What is particularly troublesome about the security loopholes in technology is that in today’s world, you don’t need to have connections, an MIT degree, or a high net worth to learn how to gain access to the information you seek. There is an endless number of websites and videos providing information on how to hack someone else’s data. Unfortunately, this information is easy to find and access.
There are also many popular and easily accessible hacking tools available to the public. Some of the more popular and easily available ones are named Angry IP Scanner, Burp Suite, Cain & Able, Ettercap, John the Ripper, Metasploit, NMap, Nessus Remote Security Scanner, THC Hydra, and Wapiti.
A hacker can also bring one of many relatively inexpensive and portable devices to a Wi-Fi hotspot and attract any other device trying to find a Wi-Fi access point. Such devices steal the credentials of legitimate Wi-Fi access points and pose as that Wi-Fi access point. Once a user logs into this fake Wi-Fi access point, it’s relatively easy for the hacker to access the information stored on the user’s network – or even alter that information. The hacker can continue to access and alter information even after the initial attack. Most tablets, phones, and other Wi-Fi devices automatically connect to a network they have previously accessed, and these devices allow the hacker to respond to previously accessed networks by impersonating that network.
Don’t Leave the Metaphorical Door Open
At the end of the day, we are the protectors of our clients’ information and data. It would be naïve not to believe that a motivated individual would not be tempted and able to access our clients’ information – especially if we leave the metaphorical door open to them. Attorneys need to have conversations with their clients about the risks of hacking and how to safeguard against it. Everyone, especially attorneys, should consider turning on the “Ask to Join Network” function on their devices to prevent automatically joining Wi-Fi networks. We should also use tools like wireless intrusion prevention systems to safeguard against hacking. Finally, we all need to think twice the next time we consider accessing the free Wi-Fi available at the airport or at our local coffee shop.
David Sarif is a partner at Naggiar & Sarif in Atlanta, GA. He devotes his practice to divorce and family law, and he represents many high-profile clients. He has been honored as a Georgia Super Lawyers Rising Star. Natalie Tyler is also a family lawyer at Naggiar & Sarif. She earned her BA in Psychology from Georgia State University and her Juris Doctorate from Atlanta’s John Marshall Law School. www.nsfamilylawfirm.com
Related Articles
Mitigating the Risks of the Cloud
The cloud makes storing files, communicating promptly with clients, and working on the go much easier – but is your clients’ information really safe when synced across mobile devices, emailed back and forth, and stored online?
The Smart Law Office
Whether it’s a connected “smart” office, voice recognition interfaces, or web-based and mobile law practice management software, 21st-century lawyers are taking advantage of the latest technologies to streamline their law practices.