Wired Equivalent Privacy (WEP)

27th February 2020 | Cybrary Wired Equivalent Privacy (WEP)


A Wired Equivalent Privacy (WEP) is a deprecated wireless security protocol that was designed to provide a wireless local area network (WLAN) with a high level of security and privacy similar to the security and privacy of a wired LAN.  Unfortunately, it has been shown to be very insecure by security researchers.  In fact, so many security problems were discovered with WEP that it is not recommended to be used and no patches were created to fix the wholes. Instead new wireless protocols like WPA and WPA2 were released to provide the necessary WiFi security users demanded.

Do Not Use WEP anywhere ever again.

Source: TechTarget

Related Terms: VLAN, Virtual Private Network (VPN)

What does this mean for an SMB?

Using WEP cannot help secure your business.  In fact it will lead to a false sense of security.  Attackers can breach a WEP network in seconds today so if you’re still using an old Access Point that only supports WEP you need to replace it immediately.  If it supports other protocols, the only one you should be comfortable using is WPA2 as of March 2020.  WPA2 uses strong encryption keys (256 bits) and has better key exchange mechanisms. However, as an SMB owner, know that any Wireless network can be compromised in a number of ways as CyberHoot has documented and trained employees on in our WiFi Dangers video as shown below

For more information on WEP and CyberHoot advice on WiFi insecurities, please watch these short videos:

WEP Explained

CyberHoot on WiFi Security

Secure your business with CyberHoot Today!!!


Sign Up Now

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more
Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more