{"id":2187,"date":"2021-01-07T09:56:00","date_gmt":"2021-01-07T09:56:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=2187"},"modified":"2021-01-11T22:00:15","modified_gmt":"2021-01-11T22:00:15","slug":"what-is-wpa2-how-to-improve-wpa2-security","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/","title":{"rendered":"What Is WPA2 &#038; How Do I Improve WPA2 Security?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>More than 68% of users rely on this WPA2 Wi-Fi encryption technology, the <a href=\"https:\/\/wigle.net\/stats\">Wireless Geographic Logging Engine (WiGLE)<\/a> shares. <strong>Here\u2019s what to know about WPA2 security for your personal and enterprise wireless networks<\/strong><\/strong>&#8230;<\/h2>\n\n\n\n<p>For a lot of us, the internet is omnipresent. Wireless security may skip our radar while connecting to the public Wi-Fi at coffee shops or the airport to update our social media or reply to emails.\u00a0However, connecting over insecure links or networks is a security hazard that could lead to potential data loss, leaked account credentials, and a litany of other concerns. This is why using the right Wi-Fi security measures is critical. \u00a0But to do that, you need to know the difference between different wireless encryption standards, including WPA2. <\/p>\n\n\n\n<p>So, what\u2019s the difference between the Wi-Fi at a coffee shop and the one we use in our home or office networks? Let\u2019s break it down!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Wi-Fi Works &amp; Why You Need to Secure Your Connections<\/h2>\n\n\n\n<p>Wi-Fi, the wireless network technology that allows devices to interface with the internet, communicates using radio waves. It\u2019s based on the Institute of Electronics and Electrical Engineers\u2019 standard <a href=\"https:\/\/en.wikipedia.org\/wiki\/IEEE_802.11\">IEEE 802.11<\/a>. However, this technology is highly susceptible to hacking since weaknesses have been discovered in the protocols upon which they\u2019re based.<\/p>\n\n\n\n<p>Consider the kind of transactions that occur over the internet via both home and business networks. You could be making online purchases from your home that requires you to enter payment information. At work, you might be accessing sensitive customer data for certain projects. As you can see, both of these networks carry sensitive information that needs to be safeguarded from unauthorized access. This typically involves the use of encryption processes and technologies.<\/p>\n\n\n\n<p>The need for wireless security arises to prevent any illegal access to maintain data confidentiality and prevent prohibited users from eating away on the connection bandwidth. Unauthorized users can wreak havoc on a network using various means, starting from eavesdropping on the connection to spreading malware across the network. Hackers also can employ a technique called <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/identity-protection\/wardriving\/\">wardriving<\/a>, where they drive around the city <a href=\"https:\/\/wigle.net\/\">mapping Wi-Fi access points<\/a> in search of unsecured networks that they can exploit or use to carry out nefarious activities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>WPA2 &amp; Other Types of Wireless Encryption Standards<\/strong> <strong>Definitions &amp; Explanations<\/strong><\/h2>\n\n\n\n<p>Let\u2019s look at the different options you can use to secure your networks and the encryption standards that make wireless security possible. As you can see from this timeline, there have actually been several types of wireless security standards that have been in use over the past 20 or so years.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"833\" height=\"368\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/01\/what-is-wpa2.png\" alt=\"This WPA2 graphic that shows a timeline of the evolution from WEP to WPA to WPA2 to WPA3 over the last two decades\" class=\"wp-image-2189\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/01\/what-is-wpa2.png 833w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/01\/what-is-wpa2-300x133.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/01\/what-is-wpa2-560x247.png 560w\" sizes=\"auto, (max-width: 833px) 100vw, 833px\" \/><figcaption>A timeline representing the evolution from WEP to WPA3<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Wired Equivalency Privacy (WEP)<\/h3>\n\n\n\n<p>WEP was formally introduced as a Wi-Fi security benchmark in 1999. However, it was part of the original IEEE 80.11 standard ratified in 1997. The idea was to provide a similar level of data confidentiality as wired networks, although that goal wasn\u2019t realized. That\u2019s because WEP uses RC4, a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stream_cipher\">stream cipher<\/a> with multiple vulnerabilities, as its encryption algorithm.<\/p>\n\n\n\n<p>You see, RC4 relies on an initialization vector to prevent the same plaintext data from generating the same WEP encrypted data. However, the initialization vector is transmitted in plaintext, and by studying enough packets using the same WEP key, an attacker can mathematically derive this key.<\/p>\n\n\n\n<p>As a result, WEP is the most insecure out of all the encryption standards. WEP offers two modes of authentication:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Open \u2014 Here, the WEP key is not needed. But if specified, it will be used to encrypt traffic.<\/li><li>Shared \u2014 This means that the wireless access points and wireless clients are manually configured with the same key beforehand.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Wi-Fi Protected Access (WPA)<\/h3>\n\n\n\n<p>Wi-Fi protected access, created in 2003, is an improvement over WEP. That\u2019s because it provides enhanced security in terms of key handling and a more efficient user authorization process. WPA was introduced to enhance security for insecure WEP networks without requiring any additional hardware. It relies on the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Temporal_Key_Integrity_Protocol\">temporal key integrity protocol (TKIP)<\/a> for encryption, which dynamically modifies the keys used. TKIP incorporates key mixing functions that increase the key complexity and make it more difficult for attackers to decode.<\/p>\n\n\n\n<p>WPA also incorporates a message integrity check nicknamed \u201cMichael.\u201d Although safer than the <a href=\"http:\/\/www.isaac.cs.berkeley.edu\/isaac\/wep-faq.html\">CRC-32 checksum<\/a> used for similar integrity checks in WEP, it still has its weaknesses.<\/p>\n\n\n\n<p>This brings us to our next type of wireless encryption standard: WPA2.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Wi-Fi Protected Access 2 (WPA2)<\/h3>\n\n\n\n<p>WPA2, launched in 2004, is the upgraded version of WPA and is based on the <a href=\"https:\/\/www.tech-faq.com\/rsn-robust-secure-network.html\">robust security network<\/a> (RSN) mechanism. WPA2 operates on two modes \u2014 personal (pre-shared key or PSK) mode or enterprise (EAP\/Radius) mode. As the name suggests, the first is designed for home use while the enterprise mode is typically deployed in a corporate environment. Both of these modes rely on <a href=\"https:\/\/www.controleng.com\/articles\/wireless-security-ieee-802-11-and-ccmp-aes\/\">AES-CCMP<\/a>, a combination of counter mode with CBC-MAC message integrity method and AES block cipher for encryption. This makes it more difficult for attackers listening in on the network to spot patterns.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Pre-Shared Key or Personal Mode (WPA2-PSK)<\/strong><\/h4>\n\n\n\n<p>WPA2 personal uses a shared passphrase for access and is not recommended for a corporate environment. It is usually deployed in home networks where the passphrase is defined in the access point (router), and client devices need to enter the same passphrase to connect to the wireless network. The encryption passphrase is stored on the individual endpoint devices and can easily be recovered. Additionally, every time an employee leaves the organization, or if the passphrase is somehow disclosed, it\u2019ll have to be changed individually on all access points and connecting devices.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Enterprise Mode (EAP)<\/strong><\/h4>\n\n\n\n<p>The enterprise PA2 has multiple options for Extensible Authentication Protocol (EAP) \u2013 password-based authentication, certificate-based EAP, etc. Note that EAP in and of itself is an authentication framework and can be implemented by adopting various <a href=\"https:\/\/en.wikipedia.org\/wiki\/Extensible_Authentication_Protocol\">EAP types<\/a>.<\/p>\n\n\n\n<p>While WPA2 is a step up from WEP, it\u2019s still vulnerable to <a href=\"https:\/\/www.cloudflare.com\/learning\/security\/what-is-a-krack-attack\/\">key reinstallation attacks<\/a> (KRACK). KRACK exploits a weakness in WPA2\u2019s four-way handshake. An attacker may pose as a clone network and force the victim to connect to the malicious network. This enables the hacker to decrypt a small piece of data that may be aggregated to crack the encryption key. However, client devices can be patched, and it is still more secure than WEP or WPA.<\/p>\n\n\n\n<p>This brings us to the next link in the Wi-Fi encryption standards evolution.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Wi-Fi Protected Access 3 (WPA3)<\/h3>\n\n\n\n<p>WPA3 is now considered the mandatory certification for Wi-Fi CERTIFIED\u2122 devices, according to the <a href=\"https:\/\/www.wi-fi.org\/discover-wi-fi\/security\">Wi-Fi Alliance<\/a>. But what is WPA3 and what makes it different than its WPA2 and WPA predecessors? WPA3 aims to improve some major shortcomings of WPA2 (such as its susceptibility to passphrase brute-force attacks, key reinstallation attacks, etc.). This enables it to provide better security for personal and open networks as well as security enhancements for business networks.<\/p>\n\n\n\n<p>A key benefit ofWPA3 is that it provides resilience to brute force attacks even for weak or short passwords. It replaces the <a href=\"https:\/\/www.webopedia.com\/definitions\/wpa2-psk\/\">WPA2-PSK<\/a> with WPA3 <a href=\"https:\/\/en.wikipedia.org\/wiki\/Simultaneous_Authentication_of_Equals\">Simultaneous Authentication of Equals (SAE)<\/a>, a secure password-authenticated key exchange method. <a href=\"https:\/\/www.wi-fi.org\/download.php?file=\/sites\/default\/files\/private\/WPA3_Security_Considerations_201911.pdf\">WPA3-SAE<\/a> does not transmit the password hash in clear and limits the number of guesses an attacker can make. Yet, last year researchers discovered several security flaws (downgrade attacks, side-channel attacks, etc.) in the <a href=\"https:\/\/wpa3.mathyvanhoef.com\/\">dragonfly<\/a> handshake used in WPA3 (that replaced the <a href=\"https:\/\/www.wifi-professionals.com\/2019\/01\/4-way-handshake\">four-way handshake<\/a> used in WPA2).<\/p>\n\n\n\n<p>Wi-Fi Alliance has released patches for these vulnerabilities. But given the frequency of Wi-Fi standards failing with KRACK (in the case of WPA2) and <a href=\"https:\/\/securityboulevard.com\/2019\/08\/wi-fi-wpa3-standard-fails-again-as-new-dragonblood-bugs-found\/\">dragonblood<\/a>, relying solely on them may not be the smartest choice for securing our networks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>5 Tips on Ways to Improve WPA2 Security<\/strong><\/h2>\n\n\n\n<p>Many users continue to use WPA2 personal in their home or small business network to access the internet. Here are some pointers you can use to keep your communication secure:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Keep your devices patched and up to date.<\/strong> Update the operating system on all client devices on the network for boosting WPA2 security. This ensures that the latest patches against known vulnerabilities (like KRACK) have been installed.<\/li><li><strong>Use strong and unique passwords with a greater password length.<\/strong> Increase complexity by using special characters, numbers, uppercase, and lowercase letters.<\/li><li>Ensure that no default credentials are used on any of the access points (such as admin credentials on a router).<\/li><li><strong>Enter the IP address to access router settings using a web browser.<\/strong> Under firmware settings, routinely check for any available updates pending installation on your router. Additionally, consider replacing your router once manufacturers stop supporting it and the product is discontinued. Modern Wi-Fi systems such as <a href=\"https:\/\/support.google.com\/wifi\/answer\/7168315?hl=en&amp;ref_topic=9831837\">Google Wifi<\/a> have a feature for installing automatic updates.<\/li><li><strong>Disable remote access to your router<\/strong>. To ensure that your router settings cannot be tampered with over a wireless connection, disable access over Wi-Fi so that changes can only be made by plugging in via an ethernet cable.<\/li><\/ul>\n\n\n\n<p>Besides the above-mentioned tips, using a virtual private network (VPN) or adopting <a href=\"https:\/\/sectigostore.com\/blog\/12-network-security-best-practices-to-secure-your-business\/\">security best practices<\/a> such as browsing over secured HTTPS connections can provide an additional layer of security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than 68% of users rely on this WPA2 Wi-Fi encryption technology, the Wireless Geographic Logging Engine (WiGLE) shares. Here\u2019s what to know about WPA2 security for your personal and&#8230;<\/p>\n","protected":false},"author":9,"featured_media":2190,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","tve_updated_post":"","tve_custom_css":"","tve_user_custom_css":"","tve_globals":{},"tcb2_ready":0,"tcb_editor_enabled":0,"tve_landing_page":"","_tve_header":"","_tve_footer":""},"categories":[13],"tags":[180,179,178],"class_list":["post-2187","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-wi-fi","tag-wireless-networks","tag-wpa2","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is WPA2 &amp; How Do I Improve WPA2 Security? - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"Wi-Fi Protected Access2, or WPA2, is an updated version of WPA that relies on AES instead of TKIP for encryption. It&#039;s the precursor to WPA3.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is WPA2 &amp; How Do I Improve WPA2 Security? - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"Wi-Fi Protected Access2, or WPA2, is an updated version of WPA that relies on AES instead of TKIP for encryption. It&#039;s the precursor to WPA3.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-07T09:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-11T22:00:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/01\/what-is-wpa2-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lumena Mukherjee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lumena Mukherjee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-wpa2-how-to-improve-wpa2-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-wpa2-how-to-improve-wpa2-security\\\/\"},\"author\":{\"name\":\"Lumena Mukherjee\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/8fc401352fbdfcfdf08996099c088b1f\"},\"headline\":\"What Is WPA2 &#038; How Do I Improve WPA2 Security?\",\"datePublished\":\"2021-01-07T09:56:00+00:00\",\"dateModified\":\"2021-01-11T22:00:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-wpa2-how-to-improve-wpa2-security\\\/\"},\"wordCount\":1505,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-wpa2-how-to-improve-wpa2-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/what-is-wpa2-security.jpg\",\"keywords\":[\"Wi-Fi\",\"wireless networks\",\"WPA2\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-wpa2-how-to-improve-wpa2-security\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-wpa2-how-to-improve-wpa2-security\\\/\",\"name\":\"What Is WPA2 & How Do I Improve WPA2 Security? - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-wpa2-how-to-improve-wpa2-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-wpa2-how-to-improve-wpa2-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/what-is-wpa2-security.jpg\",\"datePublished\":\"2021-01-07T09:56:00+00:00\",\"dateModified\":\"2021-01-11T22:00:15+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/8fc401352fbdfcfdf08996099c088b1f\"},\"description\":\"Wi-Fi Protected Access2, or WPA2, is an updated version of WPA that relies on AES instead of TKIP for encryption. It's the precursor to WPA3.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-wpa2-how-to-improve-wpa2-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-wpa2-how-to-improve-wpa2-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-wpa2-how-to-improve-wpa2-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/what-is-wpa2-security.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/what-is-wpa2-security.jpg\",\"width\":1600,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-wpa2-how-to-improve-wpa2-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is WPA2 &#038; How Do I Improve WPA2 Security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/8fc401352fbdfcfdf08996099c088b1f\",\"name\":\"Lumena Mukherjee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g\",\"caption\":\"Lumena Mukherjee\"},\"description\":\"Lumena is a cybersecurity consultant, tech writer, and regular columnist for InfoSec Insights. She is currently pursuing her masters in cybersecurity and has a passion for helping companies implement better security programs to protect their customers' data.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is WPA2 & How Do I Improve WPA2 Security? - InfoSec Insights","description":"Wi-Fi Protected Access2, or WPA2, is an updated version of WPA that relies on AES instead of TKIP for encryption. It's the precursor to WPA3.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/","og_locale":"en_US","og_type":"article","og_title":"What Is WPA2 & How Do I Improve WPA2 Security? - InfoSec Insights","og_description":"Wi-Fi Protected Access2, or WPA2, is an updated version of WPA that relies on AES instead of TKIP for encryption. It's the precursor to WPA3.","og_url":"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/","og_site_name":"InfoSec Insights","article_published_time":"2021-01-07T09:56:00+00:00","article_modified_time":"2021-01-11T22:00:15+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/01\/what-is-wpa2-security.jpg","type":"image\/jpeg"}],"author":"Lumena Mukherjee","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lumena Mukherjee","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/"},"author":{"name":"Lumena Mukherjee","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/8fc401352fbdfcfdf08996099c088b1f"},"headline":"What Is WPA2 &#038; How Do I Improve WPA2 Security?","datePublished":"2021-01-07T09:56:00+00:00","dateModified":"2021-01-11T22:00:15+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/"},"wordCount":1505,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/01\/what-is-wpa2-security.jpg","keywords":["Wi-Fi","wireless networks","WPA2"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/","url":"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/","name":"What Is WPA2 & How Do I Improve WPA2 Security? - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/01\/what-is-wpa2-security.jpg","datePublished":"2021-01-07T09:56:00+00:00","dateModified":"2021-01-11T22:00:15+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/8fc401352fbdfcfdf08996099c088b1f"},"description":"Wi-Fi Protected Access2, or WPA2, is an updated version of WPA that relies on AES instead of TKIP for encryption. It's the precursor to WPA3.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/01\/what-is-wpa2-security.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/01\/what-is-wpa2-security.jpg","width":1600,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-wpa2-how-to-improve-wpa2-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is WPA2 &#038; How Do I Improve WPA2 Security?"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/8fc401352fbdfcfdf08996099c088b1f","name":"Lumena Mukherjee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g","caption":"Lumena Mukherjee"},"description":"Lumena is a cybersecurity consultant, tech writer, and regular columnist for InfoSec Insights. She is currently pursuing her masters in cybersecurity and has a passion for helping companies implement better security programs to protect their customers' data."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=2187"}],"version-history":[{"count":0,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2187\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/2190"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=2187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=2187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=2187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}