Most of the security framework suggests to perform wireless scanning in the operational and critical areas of the organization. One of the reason is to ensure any internal wireless access points should be secured to ensure no member can misuse wireless points for unauthorized content sharing.
Present question is to understand the process or mitigation control for the external (neighboring offices) wireless access points which gets noticed in critical/operational areas of organization. How this can be dealt with and any specific mitigation control in such scenario
Can someone provide more insights on this security gap
You must sign in to rate content.
You must login to leave a comment.