Our Partners close more business.

Use these powerful resources to win more business, faster, with less effort.  
Call 877-411-2220 x121 for personal support with any opportunity.

RESET SEARCH

Hosting Quote Estimator

GET a FREE Sandbox or Trial Environment NOW

How To Use This Tool:  

To find answers to common RFP and RFI questions, select a tag, or, search for terms like "security", "performance", etc.  You will find common questions and answers grouped together in one record.  Follow the tag links to refine your search.  Supporting downloads and documentation are available, below.

Please login to obtain download access to additional supporting documentation.  Registered users can also contribute to the database.  You can request access by Contacting Us.

© Omegabit LLC, 2023

Enter a Search Phrase or Select a Tag

Content with tag wireless .

Information Security - Wireless

Q:

Do you have an established usage restrictions and implementation guidance for wireless access?

Does wireless access require authorization before connection?

Are wireless connections encrypted using WPA2 or higher?

Do you monitor and restrict connection and use of unauthorized mobile devices, writable, removable media in information systems?

Do you employ full-device encryption or container encryption to protect the confidentiality and integrity of the client information on mobile devices?

Wireless Policy


A:

Ref: Omegabit Employee Handbook, Guidelines and Operations Wiki procedures.

Yes.

Any secure communications are further tunneled and wrapped in either IPSec or SSH depending on the nature of connection. All wifi connections including LAN Wifi are hardened similarly as with public or unprotected network links.

Yes.

IPSec, SSL, SSH (256-bit)

Wireless Policy: This is documented in Part III, Section 6. Wireless Communication Standard, IT Security Handbook.



No comments yet. Be the first.

Personnel & Contractors - Rules and Policies

Q:

Acceptable Use? If yes, are they required to sign/acknowledge the policy?

Code of Conduct / Ethics and conflict-of-interest? If yes, are they required to sign/acknowledge the policy?

Confidentiality Agreement / Non-Disclosure Agreement? If yes, are they required to sign/acknowledge the policy?

Are employees and contractors required to comply with security policies in which non-adherence is subject to disciplinary action, up to and including termination and/or civil or criminal liability?

Have you established rules that govern users (employees and contractors) on the expected behavior with regards to information and information system usage?

Do you have an established usage restrictions and implementation guidance for wireless access?


A:

Yes.

Yes.

Yes.

Yes.

Generally speaking, any externalized service is specifically contracted to match or exceed the terms and conditions of any relevant Client project or activity and parties are required to agree to complementary terms of engagement that are commensurate with Client and SLA requirements.

Yes

 



No comments yet. Be the first.

Wireless Connections - encryption

Q:

Are wireless connections encrypted using WPA2 or higher?


A:

Any secure communications are further tunneled and wrapped in either IPSec or SSH depending on the nature of connection. All wifi connections including LAN Wifi are hardened similarly as with public or unprotected network links.



No comments yet. Be the first.