Wireless Audit, Physical Audits & Vulnerability Scans

Protect Your IT

IT security statistics are scary:

  • A computer on the Internet will be hacked within 12 hours if not properly secured
  • One email in every 300 contains a virus or malicious code
  • Over 40 new viruses and worms are found each day
  • 79% of the 500 wireless networks surveyed were found to be vulnerable to “drive-by” hacking

Source: 2002 CSI/FBI Computer Crime and Security Survey, www.gocsi.com

If you don’t have an IT department, hackers will get to you.  If you do have an IT department they’re probably busy fixing email issues and upgrading software and hardware, and don’t have the time to keep your network fully protected.

That’s where Far Out Solutions comes in.  We’ll perform one or more of the following six services and let you know exactly where your IT security stands:

  • Wireless audit – SSID identification, AP security, encryption verification, MAC spoofing and perimeter testing
  • Vulnerability scans – port scanning, IP spoofing, ARIN auditing, Web server, email and FTP auditing
  • Penetration tests – Platform exploits, scripting errors, buffer overflows, update neglect and patch degradation
  • Device management – Firewall/IOS configuration, change management, policy auditing and implementation
  • Physical penetration – Facilities audits, location hardening, social engineering and dumpster diving
  • Education – Timely, pertinent instruction directly related to your infrastructure and specific responsibilities of key personnel

Wireless Audit

Wireless networking offers flexibility, mobility and the fastest return on investment in terms of productivity.  But these benefits come with drawbacks – mainly an environment that’s highly susceptible to hacker attacks.

Take advantage of our ability to design and implement a safe, secure wireless environment.  We are pros at designing, implementing  and securing all major AP manufacturers, so no matter what system you’re using we can keep it safe.

Contact us if you’re ready to leave the network security worries behind.

Vulnerability Scans

There are many ways in which your system could be vulnerable:

  • Hacker attacks.  They begin with reconnaissance missions that are often overlooked by even the most attentive and talented network administrators and usually masquerade as innocent traffic.  As hackers carefully probe and prod your network it gives them information about your file structures and operating system.
  • Networks that unknowingly give too much information.  Even if it’s to an authorized party, this information is now out there and has to be reissued, which is a time-consuming hassle.
  • Using the default web server installation.  This leaks security information like a sieve.

You could go crazy worrying about all this, so let us do the worrying instead.  Contact us to close these vulnerability loopholes and start sleeping better.

Penetration Tests

This is the second step hackers take after scanning your systems for vulnerabilities and is the short way of saying, “We’re going to rifle through every one of your applications until we find a way in.”

It’s easier than it should be, because busy IT techs can take too long to fix scripting errors and apply current updates and security patches.  Hackers can then use the compromised machine to gain access to your entire system.

Don’t let this happen to you.  We have over 400 software tools created specifically for testing and exploiting any hole in your network, and then fixing what we find.

Physical Audits

While virtual security is often top of mind, old-school physical security can be overlooked.  Hackers are a big threat – but so are burglars and other “bad guys.”

We work with several active duty law enforcement officers to conduct facility audits that attempt everything from social engineering to physically penetrating your facility.  These attempts are coordinated with local law enforcement and your alarm company and so require prep time – but are worth it.

If you wonder how vulnerable your office is, a physical audit is for you.  We run the gamut of potential security breaches including alarm systems, physical locks, unattended equipment, wiring closets, common password hiding places, misconfigured fire alarms and unrestricted access.

Even though everyone thinks they’re safe, we have yet to fail to penetrate a physical facility.  But once we do get in, you’ll  know what needs to be  fixed.  So contact us now to schedule your physical audit – before it’s too late.