Contact us

Wireless Security changes vendor defaults for wireless access points before authorizing the access point implementation. It configures wireless access points with strong encryption (AES WPA2 at a minimum) and places wireless access points in secure locations. performs quarterly scans to identify unauthorized wireless access points and takes appropriate action if it discovers any unauthorized access points. It configures firewalls to deny or control any traffic from a wireless environment into the covered data environment.

Configuration Management

Learn more