
Martin Hořický
You can configure the wireless firebox to detect unauthorised wireless access points that operate within the same range as your wireless network.
An unwanted access point is any wireless access point within range of your network that is not recognised as an authorised access point or is not configured as an exception in your wireless deployment. A rogue access point can be an unauthorised access point that someone within your organisation has connected to your network without permission. These access points pose a security risk to your wireless and wired network if they do not have the proper security features enabled. A rogue access point can also be an access point outside of your wireless network that is within range of your network. This includes fraudulent access points such as Honeypot or Evil Twin that masquerade as legitimate access points by broadcasting the same network SSID name as your authorised access points.
When you enable rogue access point detection on your Firebox wireless device, the device's wireless radio scans the wireless channels to identify unknown wireless access points. You can configure the scan to run continuously or to run at a scheduled interval and time of day.
It is a form of attack where the attacker tries to lure user´s data by using a fraudulent e-mail message or a page that resembles a familiar website or e-mail address. When the attack is successfully carried out, login data or even access data to bank accounts is stolen. The best targeted group is the elderly, who do not have sufficient knowledge in Internet security and are easily lured by fraudulent e-mails.
Most often, phishing attacks can be associated with topics such as:
However, there are ways to effectively defend against phishing attacks. In addition to properly set mail hygiene in the company (allowed and forbidden mail servers, spam filters, content filters, etc.), it is very important to ensure that employees are regularly trained in cybersecurity, thus ensuring their vigilance.
OUR APPROACH AND SOLUTIONS
Social engineering is usually the first step to infiltrating a company. At BDO, we implement smishing and phishing campaigns, the aim of which is to verify how many of target users fall victim to social engineering.
Campaign steps:
Martin Hořický