Protecting intellectual property remains a concern for all organizations, even as new threats continue to emerge. Whether it’s a military unit establishing a base of operations in denied territory or a business undergoing a considerable liquidity event, the first order of protection is typically establishing “gates.” These walls and physical barriers help protect individuals and their teammates/employees in locations where they lay their heads at night.
Most businesses open to the public have Wi-Fi available for their guests. Sometimes it’s password protected, and sometimes users only need to be close enough to the router. It is shockingly easy to pick up a Wi-Fi signal from the road with a laptop and magnetized GPS puck, and then conduct a quick open-source search for the default admin username and password to a particular router. Despite how large the “gate” was, the internet signal provides individuals with a passive avenue into building, whereby access could be granted to browsing history, cloud storage, Apple ID or iTunes and more.