COVID-19: remote delivery options
We want to reassure our clients that all training and consultancy services will go ahead as scheduled during the COVID-19 situation. Please refer to our COVID-19 policy for more information.
What is a wireless network penetration test?
Employing a wireless network can offer greater flexibility, but it comes with greater potential for an attack. From rogue access points to weak encryption algorithms, threats to wireless networks are unique, and the risks can be significant.
Wi-Fi can provide opportunities for attackers to infiltrate your organisation’s secured environment – irrespective of security access controls.
Penetration testing can help identify weaknesses in your wireless infrastructure. It involves:
- Identifying vulnerabilities in the wireless infrastructure;
- Safely exploiting any identified vulnerabilities; and
- Providing a report that contains an ordered list of issues, their associated risk, and remediation advice for identified vulnerabilities.
It uses both advanced manual testing techniques and automated scans to simulate real-world attacks to identify risks within your organisation, and covers:
- Secure authentication
- Rogue access point detection
- Client isolation
- Secure configurations
Download the full service description
Learn more about our wireless network penetration test
Speak to an expert
For more information on how our CREST-accredited penetration testing services can help safeguard your organisation, call us now on +44 (0)333 800 7000, or request a call back using the form below.
Get in touch
Did you know?
Wireless networks present less of an obstacle for attackers than wired networks. Criminal hackers generally consider wireless networks to be ideal entry points into an organisation’s systems.
Wireless network traffic is also easily recorded. Criminal hackers can gather proprietary information, logins, passwords, intranet server addresses, and valid network and station addresses. They can steal Internet bandwidth, transmit spam or use your network as a springboard to attack others. They can capture and modify traffic to masquerade as you, with financial or legal consequences.
Benefits of a wireless network penetration test
Our wireless network penetration test will help you:
- Identify and understand the technology-related vulnerabilities affecting your wireless infrastructure;
- Find out how an attacker could move through your wireless infrastructure, escalating their privileges and compromising the corporate network;
- Understand the potential business impacts of wireless infrastructure vulnerabilities;
- Demonstrate a strong security posture to clients by providing third-party assurances that your external infrastructure is secure;
- Comply with ISO 27001, the UK DPA (Data Protection Act) 2018 and the GDPR (General Data Protection Regulation), the PCI DSS (Payment Card Industry Data Security Standard), and other laws, regulations and contractual obligations; and
- Protect brand loyalty and corporate image by reducing the likelihood of a security breach.
Is a wireless network penetration test right for you?
If you are responsible for your network, you should ask yourself:
- Have you identified all your access points? How many unsecured or poorly secured access points are there?
- Is data freely flowing through your network without being encrypted?
- Are there unauthorised access points on your network?
- Is it possible that your IT department could misconfigure or accidentally duplicate a wireless network?
- Has the appropriate security been put in place to prevent attacks?
- Have you updated wireless protocols to an industry-accepted protocol (WPA2)?
Our wireless network penetration testing methodology
IT Governance’s Wireless Network Penetration Test follows our proprietary security testing methodology, which is closely aligned with the SANS and OSSTMM (Open Source Security Testing Methodology Manual) methodologies.
IT Governance uses various tools and techniques to complete the agreed testing.
“IT Governance combines the delivery of real insights with a cost-effective service.”
- IIan Kilpatrick, Group Information Security Officer at Collinson Group