Check Operating System for Security Vulnerabilities  
  Check Operating System for Validity (optional, but recommended)  
  Check Servers & Workstations for Viruses, Trojans, Spyware, Adware, & other Malicious Software  
  Check DSL or Cable modem for proper settings and security best practices  
  Check Router or Firewall for proper settings and security best practices  
  Check Wireless Access Point for security best practices  
  Provide a written report identifying vulnerabilities found and prioritizing any needed repairs  
  Post-Assessment Discussion of General Business & Computer Security Risks  
Home About Me Contact Support BLive To Me! Monthly Specials
 
  Check All Wireless Access Points for Security Best Practices:


We check your wireless access points to ensure they are no longer using insecure factory default settings and standard, well-known passwords.

After discussing with you how you want to use wireless connectivity in your business network, we may be able to implement measures to make your wireless network less detectable to "drive-by" hackers looking for unprotected wireless networks.

Assess the physical security of deployed wireless access points and if necessary create a plan to relocate the access point to a more secure location within the building.

Check the wireless signal strength at various points inside and outside the building to see if there are external locations where an intruder could sit for extended periods without significant risk of discovery.

We also check for the presence of unauthorized access points.  If a so-called Rogue access point is detected, we will work with you to determine if it is a previously unknown access point installed by someone in your organization to meet a business need, or if it was installed by someone outside your company to provide an alternate entry into your business network.

 
 
  Copyright 2005 Duke InfoSecurity & InfoTechnology Services. All rights reserved
PRIVACY POLICY                    Terms of Services & Legal Notices