Loose Chips Sink Ships: Finding Vulnerable Devices on Your Corporate Networks
Your company takes cybersecurity seriously. Your employees use two-factor authentication to login to their professional devices. You keep your computers and phones up to date with security patches. You set up firewalls. So how did you end up with a data breach?
You forgot that the smart fridge in the break room hasn’t been updated since it was installed. Maybe your old security cameras are no longer supported by the vendor. Or maybe an employee forgot to take their Apple Watch off and inadvertently allowed a hacker to remotely bypass security restrictions.
As WIFI becomes a standard feature on products like thermostats, vacuums and building security systems, your network could be at risk from common devices in your office. Luckily WarCollar offers solutions.
Commercial Penetration Testing
Penetration Testing (Pen Testing) uses real-world tactics, techniques, and procedures to create cyber-attack simulation to test the effectiveness of your IT security defenses, policies, and staff. WarCollar will assess your Information Security defenses by combining multiple testing strategies into a comprehensive offensive engagement, with the sole objective of gaining access to critical assets.
The DopeScope 2.0
If you have the internal capacity to test your defenses, we offer an affordable tool to help your IT staff to determine the optimal spot from which to perform any authorized WiFi penetration testing activities. WarCollar’s DopeScope 2.0 is a directional Wi-Fi Sniffing device that fits in the palm of your hand. It is built on a powerful ESP32 wireless SoC. This SoC features a dual-core CPU, 520 KiB SRAM, 4MB of program memory, 802.11bgn and Bluetooth 4.2 BR/EDR and BLE. We’ve attached an RGB IPS screen with a resolution of 160x80 with a lens that allows for easy handheld Wi-Fi hunting.