Skip to content

Salus Cyber

First
line of defence

Wireless Security

Mobilise your business

Whatever you do, wherever your teams are

Implementing a security strategy that minimises the potential for wireless networks and devices to be exploited is crucial.

Effective management of the potential threats with wireless technology requires a sound and thorough assessment of risk given your unique environment – which is then turned into a plan to mitigate any identified vulnerabilities.

We develop a framework to help you understand and assess the various cyber risks associated with the use of wireless technology, supplemented with a recommendation outline for countering those threats.

Wireless Security

WIRELESS PENETRATION TESTING

Traditional wi-fi testing to establish whether malicious threat actors can break into networks and access underlying data.

BYOD REVIEWS

Identify the full risk profile and implications of allowing corporate data to be accessed on personal devices.

NETWORK SEGREGATION TESTING

Most wireless networks provide varying levels of access, so here we focus on the network implementation to ensure segregation and network hopping isn’t possible.

More First line of defence services

Penetration Testing

Learn more

Vulnerability Management

Learn more

Cloud Security

Learn more

Web Apps & Services

Learn more

How we work

Customer Journey

  1. Identify

    First, we take time to familiarise ourselves with your business. This allows us to clearly understand your requirements, your business risks, your key pain-points, and the outcomes you’re looking for.

  2. Understand

    We turn those requirements into crystal-clear scoping and test plan documents, so you know precisely what we’ll be doing, when we will be doing it, and how we will do it.

  3. Test

    We deliver what we promised.
    Simple.

  4. Inform

    Every report we create is unique based on your business, we don’t use cookie cutter data for our summaries or our remediation plans. Our precise and concise findings brief will advise what steps your business needs to take next to reduce cyber risk.

  5. Remediate

    We can ensure that the remediation process is tracked and coordinated within your business, we will allocate resources to point you in the right directions or if you need our help directly with remediation, we’ve got you covered.

  6. Feedback

    Your opinion is important to us, so we send a questionnaire to every one of our customers after each project – so you can let us know how we did.

Request a call back