
Our focus is to deliver the highest quality services, helping our customers achieve their goals
Wireless Security
The prevalence of wireless networks is unquestionable. But not all wireless implementations are the same. Many companies use vertical applications, such as queue busting wireless handheld scanners. Other companies may be using wireless for updating display devices or warehouse management. Automobile and even bio-technology companies now use wireless technologies for monitoring and updating systems. CCTV Cameras might communicate wirelessly, and Matta has compromise systems previously where insecure 'physical' security equipment has been shared on internal network infrastructure.
Not all wireless audits are on 802.11x, but emerging standards such as WiMax and the 5Ghz spectrum may also factor. Matta has specialist equipment for testing across the whole wireless spectrum.
A wireless audit can therefore comprise many functions. Matta establishes the objectives, equipment and landscape before determining a Plan of Approach.
In addition, depending on the attack vectors concerned, it may not be how easy a wireless system is to compromise, but how easy it is to initiate a Man in the Middle (MiTM) attack by spoofing wireless access points.
For more information about Matta’s wireless security audits, please contact us for a no obligation discussion with a security consultant.