WiFi is found almost anywhere. Coffee shops, hotels and even your organisation uses WiFi to provide connectivity to users. The ease of use and comprehensive support of the WiFi protocol helped to ensure its ubiquity.
Most WiFi installations are configured to use the Wired Equivalent Privacy (WEP) or WiFi Protected Access (WPA) to protect the wireless network. Unfortunately, the tools at the disposal of attackers have grown considerably. These tools help attackers to obtain access to wireless networks, sometimes undetected. Suboptimal wireless settings, such as weak passwords and inadequate protection settings, dramatically decreases the difficulty for an attacker to break into a wireless network. Once on a wireless network, an attacker can start to infiltrate the rest of the corporate network. It is, therefore, crucial to ensure that WiFi is protected within your organisation.
Most laptops used by employees can also easily be turned into WiFi access points. Employees typically do this to allow their personal devices to access the corporate network through the ad-hoc WiFi access points. The problem with this approach is that employees often fail to apply proper security measures and tend to choose weak passwords to protect their access points. An attacker can, therefore, target such devices to obtain network access.
The Crimson Wall team helps enterprises to secure their WiFi using a risk-based wireless audit strategy to uncover and address wireless risks. We also audit the password strength of ad-hoc access points present in your organisation. This is done in a way that does not impact your operations in any way. Furthermore, using technology developed at Crimson Wall, we can also locate these access points, thereby helping organisations to remove ad-hoc access points.