Wireless

What Is It?

A wireless network provides connectivity for devices, such as desktop workstations, laptops and mobile phones to a computer network through radio wave communication. It allows for connectivity without the need for cables. It works using network equipment known as access points that devices connect to, which route the network traffic onwards typically through a cabled connection.

Why Assess It?

There are many reasons to conduct a wireless security assessment, five of which are below.

Network Exposure

Wireless networks, by their very nature, travel through the air. This means that the wireless signal is often strong enough outside of your physical premises for a threat actor to target whilst remaining covert. A wireless security assessment provides you the confidence that no matter who can detect your wireless network, it will remain secure from eavesdropping and other attacks.

Connection Attempts

Anyone with wireless hardware can interact with your wireless network, be it capturing traffic to launch offline attacks or conducting active attacks such as attempting to trick users into connecting to an imposter network to capture and modify data in transit for example. Due to this increased attack surface, a security assessment is essential to ensure that unauthorised entry onto the network, and exploitation of users connected, is not successful.

Action Attribution

Wireless networks provide onward access to your organisations resources or to the wider Internet. Threat actors attacking third parties may look to utilise insecure wireless networks to masquerade their identity. This places your organisations reputation at risk alongside potentially incurring fines or legal action, as the threat actors actions will appear to the victim as originating from your organisation. It is critical to ensure that only authorised users can connect and that there are other security measures in place to defend your organisation against malicious network usage.

Segregation

Wireless networks ca be used to provide visitors to your premises an Internet connection, without exposing your organisations internal network. It is important to validate the technical controls to ensure that visitors cannot circumvent any restrictions in place.

Implant Detection

Threat actors deploy implants after a physical breach, these connect back to them and expose your internal network to further attacks. These implants can either connect back through your Internet connection but increasingly, to avoid security monitoring, they provide a wireless access point for a threat actor to connect to. A wireless security assessment can include a rogue access point sweep which helps identify these implants as well as any other wireless networking equipment that may have been unofficially deployed onto your internal network, perhaps by an employee who wanted to provide wireless for their personal phone for example.

The Agility Cyber Approach

Like all our engagements, we want you to get the most out of your wireless security assessment and we do this by:

Access Points and Devices

Your wireless network may be secure but if your users’ devices are not then certain attacks will still be successful. We look at the configuration of your wireless network as well as the configuration of devices under your organisations control. This assures you of your real risk posture when providing wireless connectivity.

Threat Actor Simulation

We do not just report theoretical vulnerabilities. We show you first hand how threat actors attack wireless networks, allowing you to build better defences as well as educate your employees by providing the knowledge to improve your training.

Full Coverage

Your wireless network works with different frequencies. We do not believe in only assessing the most common ones, as threat actors target where there are weaknesses rather than based on popularity. We assess wireless networks across the 2.4 GHz, 5 GHz and 6GHz frequencies.

Practical Recommendations

The purpose of undertaking a security assessment is to understand and then improve your security posture. We focus on making clear and concise recommendations that tangibly improve your security. We deliver additional value by providing guidance on how to manage your security challenges such as providing secure guest access for example.

Physical Sweep

You deserve the full picture of how your wireless network is deployed and its security effectiveness. We conduct a physical sweep of your premises, to detect rogue access points and understand architectural defences amongst other activities.

Benefits of Partnering with Agility Cyber

Mutually Invested

Our experts work with you, not against you. There are no egotistical celebrations when a serious issue is discovered, just rapid full disclosure with pragmatic suggestions for effective remediation followed by ongoing support.

Clarity and Simplicity

We always provide clarity, believe in simplicity and value your time. An example is rather than waiting until the engagement starts, we will conduct open source intelligence gathering activities before the scoping meeting to help us understand your organisations position and risk posture thus enabling us to ask better questions, securing you higher value and saving you time.

Full Consultancy

Our team, based in the UK, is technically exceptional but we pair that with business sense to discover, triage and help you remediate the full range of security issues.

Impartiality

We are impartial, we do not sell you products or the latest buzzword laden trending solution.

Outstanding Service

We have an industry leading turnaround, agility is in our name after all. Proposals are shared with you within 24 hours of the scoping meeting. Accurate and complete daily debriefs are given during every engagement. The report is shared within 5 working days at the latest.

Scroll to Top