Wi-Fi Security Audits with Compliance Analysis

Wi-Fi Security Audits WLAN chart

Just one loophole…
Hackers are in.
Data is out.
&
“You are out of compliance.”

Our Wi-Fi Security Audits and Compliance Analysis include an examination of how the wireless network security is configured. For example, Microsoft and a number of independent organizations strongly recommend that the LAN Manager Authentication Level setting is set to Send NTLMv2 responses only, which provides authentication only when all client computers support NTLMv2. This is important because it only takes one loophole for hackers to get in and your data is lost.

Lack of proper network security configuration can create compliance issues; fines are very expensive.

Using TSCM technology, our Wi-Fi Security Audits of Wireless Local Area Networks (WLAN) helps guard against eavesdropping, network intrusions, data theft, and prevent enforcement penalties created by non-compliance to regulations. Our Wi-Fi Security Audits are included as part of our basic TSCM service, but may be ordered separately where compliance is the main issue. This audit is affordable, unobtrusive and easy to schedule.

The following privacy laws and directives may impact your Wi-Fi usage.

  • Sarbanes-Oxley Act – U.S. Public Companies
  • HIPAA – Health Insurance Portability and Accountability Act
  • GLBA – Gramm-Leach-Bliley Financial Services Modernization Act
  • PCI-DSS – Payment Card Industry Data Security Standard
  • FISMA – Federal Information Security Management Act
  • DoD 8100.2 – Use of Commercial Wireless Devices, Services, and Technologies in the Department of Defense Global Information Grid
  • ISO 27001 – Information Security Management
  • Basel II Accord – Banking
  • EU – CRD (Cad 3) – EU – Capital Requirements Directive – Banking

Have a Question About TSCM?

If you have any questions about Wi-Fi Security Audits or the TSCM services provided by Murray Associates, simply fill out the form below, or call us from a safe area and phone.

If you think you are under active electronic surveillance, or believe you have discovered a bug or covert video camera, go to our Emergency TSCM page. The procedural checklist there will tell you exactly what you need to do next.