DE.CM-01.273

Does your organization have a process to regularly monitor facilities for unauthorized or rogue wireless networks?

Explanation

Unauthorized wireless networks can create security vulnerabilities by providing attackers with potential entry points that bypass established network security controls. Regular monitoring helps detect rogue access points, unauthorized hotspots, or malicious wireless devices that may have been installed by external threat actors or non-compliant employees. Evidence could include wireless scanning reports, network monitoring logs, documentation of a wireless intrusion detection system (WIDS), or a written procedure for periodic wireless network sweeps with timestamps of when they were performed.

Implementation Example

Monitor facilities for unauthorized or rogue wireless networks

ID: DE.CM-01.273

Context

Function
DE: DETECT
Category
DE.CM: Continuous Monitoring
Sub-Category
Networks and network services are monitored to find potentially adverse events

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron