Security Basics mailing list archives
RE: Wireless security question
From: "Hamlesh Motah" <admin () hamlesh com>
Date: Wed, 22 Dec 2004 22:47:56 -0000
So essentially you want to prevent people who have wireless network cards from connecting onto your network, bridging with a wireless network, and transferring data that way. What would stop them copying sensitive data to their laptop and just walking out of the office with it. This would be simpler than the network bridging. Seasonal greetings :) Hamlesh Motah. Managing Director, Hamlesh Consultants Ltd. tel: +44 (0)870 762 2424 fax: +44 (0)870 762 3834 mob: +44 (0)709 212 0732 ema: admin () hamlesh com web: www.hamlesh.com Hamlesh Consultants - IT Consultancy - Total Solutions Provider. Any opinion expressed in this e-mail or any attached files are those of the individual and not necessarily those of Hamlesh Consultants Ltd. This e-mail and any attached files are confidential and intended solely for the use of the addressee. This communication may contain material protected by law from being passed on. If you are not the intended recipient and have received this e-mail in error, you are advised that any use, dissemination, forwarding, printing or copying of this e-mail is strictly prohibited. If you have received this e-mail in error please contact the sender immediately and destroy all copies of it. -----Original Message----- From: Marty [mailto:groupecci () yahoo ca] Sent: 22 December 2004 16:57 To: Sec Basic Subject: Wireless security question Hi gang! Here is a question for you... We have a secure network with no wireless connections whatsoever. One of our laptop came in with credentials to log on to the network through the Ethernet cable BUT the person had just added a wireless card to his laptop. This situation actually came up and the person could see external wireless networks (from other companies around our building) and access Internet through there. Yeah I know they're stupid, but it's the real world! This seems like a potential threat for taking our data out the back door. Copy files accessed through our network to another network and voilà! No trace at all of the mischief. We monitor internet access and block non-company Email (Yahoo, Hotmail etc.). Suggestions? Thanks and Happy Holidays! Marty! __________________________________________________________ Lèche-vitrine ou lèche-écran ? magasinage.yahoo.ca
Current thread:
- Wireless security question Marty (Dec 22)
- RE: Wireless security question Hamlesh Motah (Dec 22)
- Re: Wireless security question Steve (Dec 22)
- RE: Wireless security question Rob McShinsky (Dec 23)
- Re: Wireless security question Michael Puchol (Dec 28)
- RE: Wireless security question Rob McShinsky (Dec 23)
- RE: Wireless security question Harshul Nayak (Dec 23)
- Re: Wireless security question Tomas Wolf (Dec 23)
- Re: Wireless security question Liran Cohen (Dec 23)
- Re: Wireless security question Nelson Santos (Dec 28)
- Re: Wireless security question threepts (Dec 29)
- <Possible follow-ups>
- RE: Wireless security question Gross Barry D. (Dec 23)
- RE: Wireless security question Andrew Shore (Dec 23)
(Thread continues...)