Following the theft of its key customer contact lists, NCTPTI Inc. (Name Changed To Protect The Innocent) hired my company to perform a security assessment. We found the client's wireless local area network (WLAN) unsecured and accessible from any area within . . .
Following the theft of its key customer contact lists, NCTPTI Inc. (Name Changed To Protect The Innocent) hired my company to perform a security assessment. We found the client's wireless local area network (WLAN) unsecured and accessible from any area within 500-plus feet of its office building. Undetected, we successfully "hacked" its network and retrieved a copy of key customer contact lists.

Our next task was to take this information to the client and tell the client what was wrong and how to fix it.

Once we identified the WLAN vulnerabilities, we immediately alerted the senior management team (SMT) to their significance. The following day, five of the six members of the SMT held a meeting at their facility to discuss the security assessment. The CEO excluded the CIO to ensure that the findings could be discussed openly.

The link for this article located at ZDNet is no longer available.