Wireless security assessment

Extending the scope of your testing to include any wireless networks is crucial. Hackers generally regard wireless as an ideal route into your systems.

The convenience and accessibility of wireless technology make it an integral part of business today. No cords or cables, just radio waves between the device of your choice and the target data.

Wireless technology is unfortunately yet another attack vector which can be compromised and used for a malicious attack if not properly secured.

Is your network properly segmented from the public access network you give to guests and clients? How easy is it to compromise your network whilst sitting outside in the car park?

Wireless networks are often the primary method by which end-user devices access organisational data. It is therefore more important than ever to ensure the deployment and configuration of these networks is as secure as possible.

From flawed encryption schemes to badly configured networks, there is plenty for a malicious user to try and exploit.

Our wireless security assessments encompass all aspects of wireless infrastructure deployments and aim to uncover weaknesses that an attacker may leverage to remotely gain a foothold into the internal network.


The assessment generally commences with reconnaissance to identify wireless networks, protocols used and technologies in use by the client, plus any other broadcast sources in the immediate vicinity, inside and immediately outside the premises.

Cognisys’ multi-faceted approach to wireless security testing assesses deployments against security best practices and can help ensure organisations adequately protect critical assets, whilst providing staff, contractors and guests the key flexibility that wireless offers.

Wireless security assessment overview

The engagement is tailored to the client’s particular topology and configuration and covers the following:

  • Wireless security analysis of the premises.
  • Identification of broadcast Service Set Identifiers (SSIDs).
  • Identification of rogue/unauthorised wireless networks.
  • Analysis of protocols and cryptography in use.
  • Suitability review of authentication schema.
  • Wireless radio configuration review.
  • Network segregation testing.
  • Analysis of wireless client protection mechanisms.
  • Pre-shared key strength analysis including cracking exercises.

Discover how we’ve helped leading organisations



Is bringing your own device to work a bad idea?

As ‘Bring Your Own Device’ or BYOD rises in popularity, with more than two-thirds of us using a personal device at work, it’s important for businesses to understand the security risk that this can pose.


What is attack path management?

In a world where identities are the new security perimeter, compromising identity platforms like AD and AAD provides the greatest payoff for attackers, ultimately giving them control of all users, systems and data within the organisation.


.ZIP domain registration: A risky gateway to nefarious outcomes

In the ever-evolving world of cybersecurity, understanding emerging threats is critical to maintaining a robust defence. One trend currently attracting attention is the registration of .ZIP domains.

Let’s make things happen

Fill in the form and one of our team will be in touch for a no-obligation discussion or quote regarding your requirements.

Leeds office

5 Park Place

Manchester office

The Sharp Project
Thorpe Road
M40 5BJ