act-sample-bg33.jpg

Wireless Network Assessments

Wireless Network Assessment Services

Wireless networks are obvious targets for hackers, corporate espionage, and spammers. Whether authorized or rogue, a wireless network can provide a backdoor to your core IT infrastructure. This is why you need a thorough wireless security assessment from a partner you can trust. Compass IT Compliance wireless network testing examines the subsystems, components, and security mechanisms of a wireless network and identifies any weaknesses. Our analysts consider two types of wireless network threats:

  1. Security key enumeration
  2. Rogue / ad-hoc wireless access

Compass Wireless Testing will:

  • Determine if a wireless network is vulnerable to attack
  • Determine how far a wireless network extends outside the physical boundaries of a facility
  • Test the authorization and authentication system
  • Determine how well wireless IDS / IDP is working
  • Determine if the wireless deployment meets compliance / best practices requirements (FFIEC and NIST)
  • Suggest strengthened security configurations
  • Report results in a secure manner and provide detailed recommendations for remediation prioritized by urgency

Deliverables

Detailed Technical Report with Executive Summary - The executive summary will provide a high-level overview of the assessment process, methodology used, and overall risk to the organization based on the results of the assessment. The detailed report will outline the tools that were used to conduct the testing, as well as all vulnerabilities identified during the assessment that are ranked, based on risk to the customer, and a proposed remediation strategy to mitigate the risk associated with each vulnerability

Let Compass IT Compliance assist your organization in assessing any risks present through our Wireless Network Assessment so you can secure your wireless environment, comply with regulatory compliance requirements, and save time, money, and resources in the process. Contact Us today to discuss your unique situation. Secure. Comply. Save.


Contact Us

Security Blog Posts