|
|
|
|
|
|
|
|
Check All
Wireless Access Points for Security Best
Practices:
We check your wireless
access points to ensure they are no longer using
insecure factory default settings and standard,
well-known passwords.
After discussing with you how you want to use
wireless connectivity in your business network,
we may be able to implement measures to make
your wireless network less detectable to
"drive-by" hackers looking for unprotected
wireless networks.
Assess the physical security of deployed
wireless access points and if necessary create a
plan to relocate the access point to a more
secure location within the building.
Check the wireless signal strength at various
points inside and outside the building to see if
there are external locations where an intruder
could sit for extended periods without
significant risk of discovery.
We also check for the
presence of unauthorized access points. If
a so-called Rogue access point is detected, we
will work with you to determine if it is a
previously unknown access point installed by
someone in your organization to meet a business
need, or if it was installed by someone outside
your company to provide an alternate entry into
your business network.
|
|
|
Copyright 2005 Duke InfoSecurity &
InfoTechnology Services. All rights
reserved
PRIVACY POLICY
Terms of Services & Legal Notices |
|
|
|