A: The answer has to be a qualified "maybe". Without any protection (including simple WEP) most wireless networks are extremely insecure. With additional security such as WPA/WPA2, two-factor authentication and 802.1x, wireless networks can be made much more secure.
A: Bluetooth could be a problem depending on how and where you use it. There are many myths about Bluetooth vulnerabilities. Like any other communication method it should be disabled if not needed. Several options to secure Bluetooth include disabling discovery and using secure PIN's.
A: PCI stands for "Payment Card Industry". It consists of a collaboration between American Express, Discover, JCB, MasterCard and Visa. The PCI Data Security Standard (DSS) is a set of 12 requirements for protecting cardholder data. More information can be found here.
A: From Wikipedia:Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery for information gathering or computer system access and in most cases the attacker never comes face-to-face with the victim.
A: There are many different kinds of tests that can be performed under the umbrella of 'social engineering'. Some of these are listed below:
A: YES. Syrinx Technologies strongly recommends that accurate and comprehensive policies and procedures be developed before any money is spent on security hardware, software or services. After all, how do you program a firewall without knowing specifically what network traffic is being allowed and denied? A well written set of policies and procedures will guide all future security implementations.
A: The typical policy audit consists of two phases. In Phase 1, Syrinx Technologies will read and study all of the existing IT policy and procedure documentation. Syrinx Technologies will then make recommendations as needed to add material to the existing documents or to suggest new policy documents. Phase 2 of the audit consists of taking a sampling of the policy and procedure documents and verifying that they are actually followed by sitting down with employees and watching them perform common tasks. This ensures that everyday practice is in compliance with written procedures.
A:
A:
A:
|