Category: News

  • Your Wi-Fi May Be Revealing More Than You Think

    Your Wi-Fi May Be Revealing More Than You Think

    Wi-Fi signals can identify you through walls and even track your movements. Few people would disagree that Wi-Fi has become an indispensable part of modern-day life in our homes and offices.

    But as Wi-Fi networks have proliferated, researchers have discovered that the radio signals they emit can be used for purposes far beyond internet connectivity. The unique characteristics of how Wi-Fi signals interact with the human body mean that sophisticated analysis of these signals can reveal a surprising amount of personal information.

    How Does Wi-Fi Tracking Work?

    Every device that connects to a Wi-Fi network broadcasts a unique identifier known as a MAC address. Even when not actively connected to a network, many smartphones and laptops send out probe requests – essentially asking nearby networks “are you there?” – which can be logged by anyone operating a wireless receiver in the area.

    More recently, researchers have demonstrated that by analysing how Wi-Fi signals bounce off human bodies, it is possible to detect movement, recognise individuals, and even infer activities such as walking, sitting, or exercising – all without the target being aware.

    What Can You Do?

    For businesses, the implications are significant. A robust network security strategy – including segmented Wi-Fi networks, regular security audits, and managed firewall solutions – can help mitigate the risks. HPN’s Hosted Firewall and Managed Internet Access solutions are designed with exactly these concerns in mind.

    To learn how HPN can help protect your business network, get in touch with our team today.

  • Are We Moving Towards a World of Zero Trust?

    Are We Moving Towards a World of Zero Trust?

    Let’s be clear from the outset: a world of Zero Trust does not infer that we will no longer have any faith in our fellow occupants of planet earth.

    Zero Trust is a cybersecurity framework that operates on the principle of “never trust, always verify.” Rather than assuming that everything inside a corporate network is safe, Zero Trust requires continuous verification of every user, device, and connection – regardless of whether they are inside or outside the traditional network perimeter.

    Why Zero Trust Now?

    The shift to remote and hybrid working, combined with the explosion in cloud services, has fundamentally changed the network landscape. The old model of a secure perimeter around a fixed office is no longer sufficient. Threats increasingly come from inside networks – whether through compromised credentials, insider threats, or sophisticated lateral movement by attackers who have already breached the perimeter.

    Zero Trust in Practice

    Implementing Zero Trust typically involves a combination of identity and access management (IAM), multi-factor authentication (MFA), micro-segmentation of networks, and continuous monitoring of all traffic. HPN’s Hosted Firewall and Managed WAN solutions can form a key part of a Zero Trust architecture, ensuring that traffic between your sites and the internet is always verified and monitored.

    To discuss how HPN can help your organisation move towards a Zero Trust security posture, contact our team.