The state of being protected against unauthorized access to data the measures taken to achieve this.
One of the most powerful tools of network and information exchange in the modern network is the ability to connect devices wirelessly. Without physical connections, however, protection of information systems becomes decidedly more complex. Wireless testing covers common forms of wireless communications utilized throughout an organization including wireless local area networks (WLANs), Bluetooth communication and wireless peripheral devices such as keyboards and mice. Wireless communication, if not properly secured and transmitted, can be obtained through wireless sniffing techniques and either read or altered. As technology continues to advance rapidly, it is important that organizations not only look at their wireless networks, but all forms of wireless communication occurring within the organization. These ad-hoc wireless communications and streams may represent entry points into the corporate network or leak sensitive data.
The Mako Group performs detailed wireless assessments aimed at common forms of wireless communication to ensure your company’s data is safe from the bad guy.