vulnerability assessment 2

Wireless Assessments will assist an organization in confirming that their wireless network was implemented with the appropriate security controls.  It is undeniable that Wi-Fi within the office has become a standard offering.  However, organizations must balance the convenience of wireless access against security needs to ensure that corporate resources are protected.

Wi-Fi within the corporate infrastructure differs from Wi-Fi in the home.  While the technology may be similar, security requirements must be aligned to more stringent policies.  While IT professionals understand that corporate environments require the implementation of the most secure encryption and integrated with corporate ID and access control, it is a configuration which can easily be done wrong.

A Source 44 wireless assessments includes both a configuration review and an optional wireless key cracking exercise to identify potential gaps.