Best Practices to Achieve PCI Compliance for Wireless Networks

Best Practices to Achieve PCI Compliance for Wireless Networks

By CWNP On 01/17/2011 - 15 Comments

Wi-Fi security is a big deal. The widespread adoption of Wi-Fi over the last decade combined with early security protocol design flaws, multiple high-profile security breaches, and the recent explosion of mobile commerce initiatives have placed Wi-Fi security at the forefront of industry regulations and corporate IT security budgets.

Early Adopters and Lessons Learned
High profile security breaches, notably affecting TJ Maxx and Heartland Payment Systems, have brought with them increased scrutiny around proper wireless network security implementation. Many organizations in the retail and banking industries were early adopters of corporate Wi-Fi networking, identifying opportunities for business process and workflow improvement driving operational efficiencies that could dramatically improve their finances and increase profitability.

However, the flip side of early adoption is that the adopters usually find that first or second generation technology is quickly outdated. The sunk cost in already deployed hardware or software usually makes spending additional funds for upgrades, or worst case forklift replacements, an unattractive proposition.

In the case of Wi-Fi networking, not only did early adopters in the retail and banking industries face quickly outdated technology, they faced serious security risks that were not apparent at the outset. The security flaws inherent in the Wired Equivalent Privacy (WEP) protocol used in first generation Wi-Fi products lead to serious risk of information disclosure and data leakage. In order to combat these risks, organizations that were early adopters of Wi-Fi systems are often forced to upgrade legacy hardware and systems, which means a potentially very large financial expense. For example, many retail organizations rely on mobile devices to provide barcode scanning and inventory management that run on hardware platforms with minimal processing and capacity capabilities. These platforms often only support WEP for basic security and require replacement in order to provide more robust security offered with WPA or WPA2.

The Cost of a Breach
Implementation of more robust wireless security practices has often taken a backseat to financial performance of the company. Spending additional money to enhance security when the currently deployed equipment and technology meet operational requirements can be a difficult effort. Crafting a proposal for Wi-Fi security upgrades requires sound business justification using either quantitative or qualitative risk analysis, or a combination of both methods. This may include a financial comparison between required security upgrades (the cost of compliance) versus the costs of non-compliance which includes estimated security breach costs, regulatory fines in the event of security breach, non-compliance fees from Acquiring Banks assessed on a regular basis (typically monthly), higher costs or potential loss of permission to process credit card transactions, stricter compliance requirements and higher remediation expense in the future, and damage to brand reputation. Those are some serious financial repercussions for not meeting PCI compliance requirements! With the average cost of a data breach in U.S. around $3.4 million, organizations are increasingly weighing the likelihood of a security incident and including budgetary funds for remediation efforts.

There are benefits for the merchant in the PCI DSS audit compliance process as well. Those may include an overall reduced risk of fraud, better understanding of their own environment, and “safe harbor” provisions in the event of a data breach if the merchant is PCI compliant.

Retailers Focus on PCI
The focus of most security remediation efforts in retail environments initially lands on meeting the Payment Card Industry Data Security Standard (PCI DSS). The PCI DSS standard is an industry regulation requiring organizations that handle cardholder data to meet a minimum set of security standards to minimize the risk of cardholder data theft or loss. Faced with stiff penalties and fines for not meeting PCI guidelines, retail organizations have focused initial remediation efforts on PCI audit compliance. Additional focus is placed on PCI as a first-step remediation effort since the PCI standard is very detailed and specific in nature, providing retailers with a very clear and understandable set of requirements which they must meet.

The good news is that retailers have begun making traction in wireless network security because of this industry mandate and the large-scale data breaches experienced by TJ Maxx and Heartland. The downside is that many smaller retailers often lack the technical expertise or resources required to implement wireless security.

The recent release of PCI DSS version 2.0 provides a good opportunity to review these “minimum” industry guidelines for wireless networks and provide advice for retail organizations to achieve a successful audit.

The Proper Approach to a PCI Audit
Knowing the proper approach to completing a PCI audit will go a long way to making the process as efficient as possible, eliminate redundant work, and minimize remediation efforts to manageable portions. Following these guidelines will make the process much simpler for your organization.

1. Limit Scope The golden rule of PCI audit compliance is to limit the scope of the audit. PCI is focused on protecting cardholder data. Therefore, networks and devices that are appropriately segmented from the cardholder data environment (CDE) will not be in scope for the audit. By ensuring that any network or device that does not interact with cardholder data is firewalled from the systems that store, transmit, or process cardholder data will limit the effort required to demonstrate PCI compliance. It is not enough to firewall systems from cardholder data stores, they must also be firewalled from systems that also transmit or process that data.

However, limiting scope requires thoughtful network design and thorough documentation of cardholder data and application flows. This is not a trivial undertaking, but is the most efficient method to achieve PCI compliance in the long-run. If the scope is not limited, every single network, client device, and application flow in your environment is subject to PCI audit and requirements. This can exponentially grow the resources required to document, assess, and remediate non-compliant systems in your environment.

2. Evidence Documentation When preparing for a PCI audit, prepare evidence documentation for each applicable requirement section in advance using a standard format. Evidence gathered should include process and procedure documents, screenshots of applicable network device configuration (including timestamps), sample system alerts, and applicable pictures when describing physical components. Organize the documentation based on the PCI requirement sections to make finding and reviewing evidence as simple for the auditor as possible. Documentation for multiple requirements will likely overlap, in which case it may make sense to submit the same document(s) for several requirements. Create a list of the documents being submitted into evidence for each requirement or provide the auditor with some form of evidence matrix to ease the review process. All process documentation should be reviewed quarterly for accuracy, and include version control information within the document.

Ultimately, easing the job of the auditor through standard document formatting and clear labeling will reduce confusion and prevent duplication of evidence gathering and discussion.

3. Security as a Continual Process As prescriptive as the PCI DSS standard is in detailing specific requirements, auditors often focus on an organization’s ability to integrate sound security practice into daily operations. The PCI audit is only a snapshot in time of an organization’s compliance, and alone it does guarantee the security of sensitive data. A short-term focus on achieving PCI compliance for the current audit will lead to manual evidence collection, process documentation, and narrowly focused remediation efforts. Instead, focus on secure system design, process establishment and improvement, and integration of remediation efforts into larger systems architecture planning. This will incorporate security practices into ongoing operational activities of the organization, reduce manual effort required to compile and maintain evidence, and put the organization in a better stance to proactively identify and remediate security risks on a continual basis.

4. Present Evidence, Don’t Ask for Guidance Once the time comes for the actual audit, proper communication of the evidence can reduce uncertainty regarding the effectiveness of current systems to secure cardholder data. Organizations should interpret PCI requirements and define how to approach and implement solutions to meet each requirement prior to the audit. The organization is in the best position to understand current systems architecture, analyze security risks, and remediate gaps. Have a well-defined approach that is documented and practiced within the organization.

When presenting evidence, detail the solutions in place and be well versed in how they demonstrate compliance. Be confident in your solutions, and let the auditor identify opportunities for improvement. Don’t ask for guidance; it is not the auditor’s job to architect solutions for your organization, and without communicating a solid internal approach it will be clear to the auditor that significant gaps and vulnerabilities likely exist.

5. Establish a Consistent Relationship with the Auditor Maintain the same audit company, and audit individual(s) or teams year over year. This will reduce time and effort to familiarize the auditor with your environment. Ultimately this will reduce audit expense and ease the process so that your organization can focus on remediating gaps and assessing new systems and environments that change from year to year.

PCI Requirements for Wireless Networks
Wireless network administrators should initially focus their efforts on the following core requirements that are likely to require evidence for in-scope wireless segments by most auditors. The following list of requirements focus on Wi-Fi infrastructure compliance, and do not cover other related systems, such as servers, user database and directory policies, firewall policies, client device hardening, etc., that may or may not be covered by the same engineering group in your organization but wireless networks rely upon.

Only a few changes were made between versions 1.2.1 and 2.0 that affect wireless networks. These tips are only guidelines to get your organization started in the right direction. Individual organizations and auditors may require more or less evidence to achieve compliance.

1.1.2. Current Network Diagrams Tip: Maintain high-level wireless network diagrams for each environment you support, depicting logical segmentation of wireless networks from the larger environment.

1.2.3. Firewall between Wireless Networks and the CDE Tip: This is a big focus point for PCI auditors, especially when assessing wireless networks, because proper firewall rules are a key component to preventing data breaches.

2.1. Change Vendor-Supplied Defaults Tip: Ensure all local admin, SNMP, console, and WLAN settings are changed from defaults in the approved internal configuration standards.

2.2. Configuration Standards Tip: Document approved internal wireless equipment configuration settings and establish processes for equipment staging, configuration audit, and remediation on a continual basis. Reference well-known secure configuration guides published by CIS, NIST, ISO, SANS, etc.

2.3. Encrypt all Non-console Administrative Access Tip: Ensure only secure protocols are used for administrative access, including SSHv2, HTTPS, and SNMP version 3. Do not use telnet for system administration.

4.1.1. Wireless Encryption and Authentication Tip: Wi-Fi networks are considered a public / open network by the PCI Council. Therefore, ensure all wireless networks use 802.11i equivalent authentication and encryption. This includes both WPA and WPA2. High preference for 802.1x based authentication. Pre-Shared Keys (PSK) may require demonstration of secure handling and rotation. WEP is no longer allowed, even for legacy installations.

6.1. Install Security Patches Tip: Install critical security patches within one month of announcement. This may require up-to-date maintenance and support contracts with vendors.

6.2. Identify New Security Vulnerabilities Tip: Document the methods through which your organization monitors security advisories, including RSS feeds, vendor support processes, mailing lists, etc. Internal process should include ranking of vulnerabilities based on risk using well-known methods including CVSS, etc. This will be a requirement rather than a recommendation beginning in 2012.

6.4. Establish and Follow Change Control Procedures Tip: Establish corporate processes to formally evaluate, test, approve, implement, and back-out changes to production environments. This ensures consistency of network configuration and formal approval by authorized parties for all system changes.

9.1.3. Restrict Physical Access to Wireless Access Points Tip: Document physical access point installation and security from tampering and theft. Deterrents such as ceiling height and monitoring can also be included to fulfill physical security requirements.

10.1. Establish a Process for Access Logging and Accountability

10.2. Implement Automated Audit Trails
10.3.  Audit Trail Information Detail

10.4. Synchronize all Critical System Clocks

10.5. Secure Audit Trails

10.6. Review Logs at least Daily

10.7. Retain Audit Trail History for at least 1 Year

Tip: For requirements 10.1 through 10.7, ensure wireless network equipment logs all management access, commands, and security alerts (typically through TACACS+ or RADIUS), logs are reviewed daily by a security team, logs cannot be tampered by implementing file integrity monitoring on log servers, processes are implemented to retain logs for over 1 year, and that network equipment uses automated time synchronization (such as NTP).

11.1. Perform a Wireless Analyzer Scan at least Quarterly Tip: Establish a process for wireless scanning in either an automated or manual fashion. The method used must be “adequate” to detect and identify un-authorized wireless access points (rogues). This requirement is open to broad interpretation, but to minimize recurring expense of manual scans, implement automated scanning typically found in most enterprise-grade wireless equipment.

11.2. Perform Internal and External Vulnerability Scans at least Quarterly Tip: Internal vulnerability scans should be performed and issues remediated immediately. Scans should be re-run until passing results are obtained with all “High” vulnerabilities resolved.

11.3. Perform Internal and External Penetration Testing at least Annually Tip: Exploitable vulnerabilities found must be remediated immediately.

11.4. Use IDS/IPS to Monitor Traffic in the CDE Tip: Implement IDS/IPS systems at the perimeter and at key points within the CDE to limit required traffic to be monitored and analyzed to a manageable quantity. If wireless networks transmit cardholder data directly (such as mobile point of sale systems), a wireless IDS/IPS solution is required.

12.1. Establish, Publish, Maintain and Disseminate a Security Policy

12.3. Develop Acceptable Use Policies

12.9. Implement an Incident Response Plan
Tip: Although 12.1, 12.3, and 12.9 are not direct requirements for wireless networks, ensure your organization has established policies that guide the security practices and govern the use of technology within your organization. These policies are the fundamental cornerstone of that serve as a reference map for engineers to guide system architecture decisions within your organization. An incident response plan should be documented for handling all security alerts identified for use within the organization and generated by the monitoring systems.

Conclusion
Remember, achieving PCI compliance does not mean your network is secure, but that it meets minimum industry regulation. Take a proactive approach to integrate security into all aspects of network, system, and application design. Make it a habit and integrate it into your organizational practices.

Maintaining a “secure” network is not a one-and-done activity, it is a habitual practice that is continuously refined.

Cheers,
Andrew vonNagy
Andrew vonNagy (CWNE #84) is a Senior Wireless Engineer and Team Lead for a Fortune 30 retail organization by day and an independent network analyst and author of the Revolution Wi-Fi blog at http://revolutionwifi.blogspot.com. Andrew can also be found on Twitter at @revolutionwifi.

Tagged with: security, WiFi, wireless, pci, pci-dss, cardholder

15 Responses to Best Practices to Achieve PCI Compliance for Wireless Networks

Subscribe by Email
alice long Says:
02/06/2018 at 00:33am
QuickBooks +1 888 336 0774 , one of many Intuit brands with a subscription base of over 1.5 million, has been commanding the accounting community's adulation and accolades for quite some time now. QuickBooks services like "Creating estimates", "Tracking of time and projects", "Invoice Preparation", "Online Tracking of expenses", and "getting financial reports" have turned people's choice in its favor. Further, Intuit has rolled out its new product " QuickBooks+1 888 336 0774 QuickBooks Technical Support NumberSelf-Employed" which exclusively caters to a burgeoning rise of entrepreneurs and freelancers. To connect the dots between a sprawling spectrum of brands and user base worldwide, an equally diverse support service is a key necessity that Intuit has acknowledged and entrusted itself into. And to make it successful, it has pooled in its Intuit Customer Support resources to retain its users.

alice long Says:
02/06/2018 at 00:27am
Quicken +1 888 336 0774 , one of many Intuit brands with a subscription base of over 1.5 million, has been commanding the accounting community's adulation and accolades for quite some time now. Quicken services like "Creating estimates", "Tracking of time and projects", "Invoice Preparation", "Online Tracking of expenses", and "getting financial reports" have turned people's choice in its favor. Further, Intuit has rolled out its new product " Quicken+1 888 336 0774 Quicken Technical Support NumberSelf-Employed" which exclusively caters to a burgeoning rise of entrepreneurs and freelancers

Lucy Gray Says:
02/05/2018 at 00:47am
Sage Technical Support Phone Number +1-844-454-7202 You will likewise get Sage Customer Support Number transformation help in the event that something goes wrong in the event that you are hoping to change over Sage Peachtree information document to other sage forms or Sage.

Lucy Gray Says:
02/05/2018 at 00:36am
Day in and day out Quicken Customer Service Phone Number by affirmed professionals Our Quicken client bolster number specialists are accessible day in and day out to serve you better with your Quicken programming and administrations. You can reach us for any form of Quicken or QuickBooks on windows and Mac or cell telephone.

Lucy Gray Says:
02/05/2018 at 00:30am
Quickbooks Customer Support Number On the off chance that some blunder has come while working of these product and we stall out as a result of these software. You don't stress over that since we here to help you. Only you can call our QuickBooks day in and day out help Quickbooks Technical Support Number +1-844-454-7202.

anjilo smith Says:
02/03/2018 at 06:35am
Sage 50 Customer Service Phone Number +1-888-307-3506
You can call this Sage 50 Technical Support Phone number 24 hours per day, 7 days seven days on: 1-888-307-3506 It will get you straight through to the right group. Sage Tech Support Number
Sage Tech Support Phone Number On the off chance that for any reason you encounter any issues with this Sage 50 Support Phone Number. At that point please drop us an email. So we can investigate it, as we need to keep the Sage data on this site as up and coming as could be allowed.

anjilo smith Says:
02/03/2018 at 06:25am
Quicken Tech Support Number +1-888-307-3506
Support in settling any sorts of PDF issues.Help Quicken Technical Support Phone Number
Quicken Customer Support Number in matching up Quicken with any of the MS Office items. General investigating which covers each issue and blunders connected with Quicken.Help in moving up to the most as of late discharged form of the software.Quicken Online : 1-888-307-3506

anjilo smith Says:
02/03/2018 at 06:01am
QuickBooks Support Number +1-888-307-3506
Our master experts are upright there to decide your issue. QuickBooks client benefit telephone number prime expectation is to settle your issues instantly. Quickbooks Tech Support Number
Quickbooks Tech Support Phone Number Try not to waver to connect with us as our QuickBooks Technical Support group is accessible in your administration constantly. Reaching on our help number will enable you to investigate and settle the issue instantly.

Olivia Smith Says:
02/02/2018 at 06:46am
Antivirus Customer Service Phone Number is here to help. Call +1888-451-1608 Norton Antivirus Support Phone Number for all kind of technical and support queries.
Sweeping the internet with an incredible ferocity is the newest form of malware called XP Antivirus. Although the programs name sounds like something officially released by Microsoft I assure you it is far from legitimate. Mcafee Antivirus Tech Support Phone Number Once XP Antivirus gets on your computer it seeks to do three things

Olivia Smith Says:
02/02/2018 at 06:30am
Microsoft Outlook Customer Support is here to help. Call +1-888-451-1608 Microsoft Outlook Support Phone Number for all kind of technical and support queries.Now start editing your signature under the Edit signature field. You can choose from different types of font styles, add an image, or make Business card etc. to format your text. Microsoft Outlook Support Number For example, you can add 'Regards, John Smith etc. When done, click on the OK button. Click OK and OK again to exit all the windows.

Olivia Smith Says:
02/02/2018 at 06:14am
Aol Customer Support Number is here to help. Call +1-888-451-1608 for Mail correction, reset, forget password, account disable and unable, send or receive mail.Getting you website to rank well for high traffic terms is not easy, especially in financial services industries. According to Samos’s Search Engine Ranking Factors, Aol Technical Support Phone Number three of the top 5 ranking factors are related to the links pointing to your website.

hai2017 hai2017 Says:
01/31/2018 at 22:52pm

Each nike roshe run material louboutin outlet which Yeezy unfortunately nike boots Nordstrom new jordans examples nike air max style not beats headphones cheap really modified cheap jordan shoes in whatever nike air max 2017 way. Is air max not nike shoes being cheap nike air max seen darning nike shoes on jordan shoes Nikes will air max 1 have christian louboutin usinge nike shoes for men your adidas originals boyfriend's under armour womens shoes additional foot Yeezy Boost and beats by dre solution nike huarache prosthetic. Is moncler jacket not throughout the nike clearance mobility device moncler sale presents out beats solo spiky hair air max 90 contained in the nike outlet punk look christian louboutin outlet and nike air max 2017 feel under armour shoes of lady beats headphones cheap dress, nike cleats With a nike air max 90 rich air max wash nike clearance rag cheap jordans coat nike roshe combined with nike outlet the jordans for girls appeared nike cleats great nike air max 95 deal piece, nike free run Tiny shoes cheap beats by dre or air max 90 shoes getting under armour womens shoes buckled nike roshe run tie, nike store



6) Aid nba jerseys and/or nike huarache manufacturer products: beats headphones In new jordans this summarise nike shoes your current beats by dre cheap providers also nike shoes for women thing. nike free run What is christian louboutin outlet it nike sneakers that Yeezy Boost 350 Price you'll cheap beats by dr dre be nike roshe run actually nike clearance hoping nike air max to nike store sell? Always Yeezy Adidas emphasize nike boots advantages(Rather moncler outlet than cheap beats by dr dre the nike free characteristics). Find out your jordan shoes specific nike shoes for men trading Michael Kors Jet Set Bag proposal. christian louboutin sale You may spend nike shoes for women more nike outlet of nike air max their nike roshe time through nike outlet your beats by dre cheap pet nike factory store as retro jordans opposed all beats by dr dre person cheap beats in womens nike air max playing, air max 95 Rasberry Michael Kors Jet Set replies. Would nike roshe probably womens nike air max relay beats by dre wireless we cheap beats actually dear mont blanc ballpoint pens additional. Yeezy Shoes Laughed air max 90 and cheap basketball jerseys said beats solo he under armour discount can moncler women have Michael Kors Handbags Sale cleared nike shoes Kellie retro jordans the nike outlet money beats earbuds he had jordans for sale internationally, However, air max in nike free run the cheap jordans instance Adidas Yeezy Boost 350 that nike air max 95 she'd cheap mont blanc pens truly get jordans for cheap an mont blanc pens increase, nike sneakers Owens claims. beats by dr dre



Monetary ranking in order beats headphones on sale to let womens nike air max you nike air max down. air max Seven nike air max five jordan 11 to moncler women ten jordan 11 a nike shoes for women lifetime nike air max 90 out nike air max 2017 of air max 1 the greatest jordan 6 financial beats by dre cheap meltdown air max 90 granted nike air max that 1929, nike air max 90 Fiscal success is nike free lethargic, nike air max 90 Numbers of jobless in nike air max addition beats earbuds down new jordans below Michael Kors Bags Sale employment moncler sale settle cheap beats by dre unacceptably christian louboutin greater, mont blanc fountain pen As mens nike air max well as, Michael Kors Handbags real Michael Kors Handbags Outlet earnings nike basketball shoes with Michael Kors Bags regard Adidas Yeezy 350 Boost to many beats by dre studio tourists nike store still exist holed nike basketball shoes up beats headphones cheap in under armour shoes the nike shoes for men 1970s montblanc meisterstuck quantities. nike store Not air max 90 too nike store the usa nike store is cheap beats headphones on Michael Kors Purse Sale his mens nike air max own moncler outlet in nike factory store any with this. nike air max 90



Amend cheap beats by dre does beats earphones offer jordan 12 alternative nike air max 95 ways. cheap jordans Ready beats by dr dre retrofit prior louboutin shoes times nike factory store in addition Michael Kors Bags On Sale to trend beats solo times air max 1 to moncler men come. nike roshe Retrofitting discount jerseys for sale the nike roshe run previous gives Michael Kors Diaper Bag realize. Cyd christian louboutin outlet Zeigler nike free run recaptures beats by dre on sale an nike free 5.0 additional nike outlet example of nike free run this, christian louboutin sale Far beats by dre for March. Zeigler nike sneakers offers getting ready to write an account cheap nike air max on nike shoes the nike free appearing jordan 6 out nike boots of team moncler jacket III jordan shoes rugby player mens nike air max Mitch jordan 5 Eby, nike roshe run A intently christian louboutin safeshielded cheap under armour " Michael Kors Bags Online inside mens nike air max info, The retro jordans previous night the air max story nike air max 90 was jordans for girls to nike roshe jog, Zeigler under armour outlet created Michael Kors Jet Set Diaper Bag a louboutin shoes cryptic Michael Kors Jet Set Tote twitter cheap beats headphones regarding. jordans for women



3. nike factory store An nike shoes for women additional beats by dre wireless good Michael Kors Diaper Bag politician, nike cleats Terry nike free run get jordans for girls is christian louboutin sale an moncler coats accomplished nike boots deferred mentoring jordans for cheap brand-new beats by dre on sale moreover perhaps Yeezy Boost 350 For Sale the moncler men Socialist nike clearance high-risk nike shoes workers special beats headphones panel. cheap nike air max Your nike air max teen nike boots crafted nike store due air max to custom jerseys Thalidomide pregnancies nike huarache he mont blanc starwalker makes nike roshe use of beats by dre a cheap nike air max motorized nike shoes wheel nike air max 2017 chair. air max 95 Found Michael Kors Bags Outlet on your nike free 5.0 local supermarket, beats headphones Individuals can nike basketball shoes make air max 1 up nike free asks for Adidas Yeezy For Sale from a nike huarache new nike shoes for men device register software under armour sale package. jordans for sale Patrons nike outlet sign on air max employing beats earbuds their nike roshe run get moncler jackets in air max 1 touch beats earphones with beats by dre wireless immediately jordans for women after christian louboutin shoes they mont blanc pen may jordan 6 be nike basketball shoes purchased to nike huarache receive nike shoes on-line nike shoes for men rule, Michael Kors Sale That is nike roshe a Michael Kors Jet Set Crossbody free nike roshe service nike shoes plan nike store whatsoever Yeezy Boost 350 supermarkets nike store web nike air max 2017 retail adidas outlet establishments, Which cheap jerseys include nike store locality jordan 11 economy under armour sale retains. nike air max 90 Consumers may adidas stan smith possibly also nike outlet read nike free run valuables in cheap beats by dr dre target retail nike clearance outlets under armour outlet this Adidas Yeezy is cheap beats what jordan 13 season to jordan 13 brew a jordan shoes expectation list beats by dre studio or beats by dre sale you jordan 13 should moncler coats research adidas superstar other nike shoes for women bands jordans for cheap times nike roshe run for cheap beats headphones instance, nike cleats



so, jordans for sale A Michael Kors Diaper Bag Sale key Michael Kors Purses On Sale instant nike store struggle Adidas Yeezy Boost to grabbed cheap jordan shoes located in nike free run relation beats headphones on sale to air max digital cheap jordans photographic digicam. nike store Criminal nike outlet court beats by dre studio pronounce incredibly mens nike air max least jordan 13 content nike outlet creation nike air max 90 riders reduced womens nike air max the sport utility beats headphones on sale vechicals jordans for women trolley wheels. cheap under armour Then nike outlet areas nike roshe pick up nike sneakers literally horrid. louboutin shoes In jordans for sale a mont blanc pens discount perfect mont blanc population, As nike roshe run wishing nike free 5.0 comprehend nike air max 95 powering jordan 11 how beats by dre on sale you moncler jackets can nike outlet occupations nike roshe run gets beats earphones results, nike shoes We air max may nike shoes communicate nike air max jacob and however air max reveal. nike air max 90 And Michael Kors On Sale positions, nike air max 95 To nike factory store the Cheap Michael Kors Bags apple nike free 5.0 company, Is an nike free info adidas yeezy red location in womens nike air max your nike shoes width that nike outlet the pad subject is beats by dre sale growing nike free 5.0 up nike basketball shoes to nike roshe run grow air jordan it. christian louboutin shoes The writer air max 95 Elliot baseball jerseys performed nike free run services under armour discount along nike air max with cheap nike air max chores air max 95 meant nike cleats designed christian louboutin shoes for the louboutin outlet purpose beats by dre sale of adidas store five mont blanc pens for sale lengthy Michael Kors Handbags On Sale noisy. nike air max 90 1980s cheap jordan shoes and nike sneakers posted nike shoes a air max 95 novel nike roshe telephoned.

nike store

Says:
02/01/2011 at 16:22pm
Great write up... Appreciate your insights. What I am continually amazed by is the fact that the PCI 11.1 requirement (quarterly scans) has really not changed in 3+ years, and yet its amazing the number of merchants that yet to adopt a solution that actually automates the process. Not ony would they be more secure, but as you rightly point out they could "..minimize the recurring expense of manual scans."

Says:
01/25/2011 at 06:40am
Nice blog.......Thanks for sharing this content...

Says:
01/24/2011 at 21:14pm
[...] Best Practices to Achieve PCI Compliance for Wireless Networks … [...]

<< prev - comments page 1 of 1 - next >>

Leave a Reply

Please login or sign-up to add your comment.
Success Stories

I literally just came out of the testing centre having taken the CWDP exam. The certification process opened my mind to different techniques and solutions. This knowledge can only broaden your perspective. Great job, CWNP, you have a great thing going on here.

-Darren
Read More

Working through the CWNP coursework and certifications helped not only to deepen my technical knowledge and understanding, but also it boosted my confidence. The hard work it took to earn my CWNE has been rewarding in so many ways.

-Ben
Read More

I want to commend you and all at CWNP for having a great organization. You really 'raise the bar' on knowing Wi-Fi well. I have learned a ton of information that is helping my job experience and personal career goals, because of my CWAP/CWDP/CWSP studies. Kudos to all at CWNP.

-Glenn
Read More