||Bluetooth Scanning: Network Operators and Government should scan the airwaves (where possible) inside your business to locate all Bluetooth capable devices. Inventory all discovered devices with Bluetooth interfaces, including hardware model, OS, and version. Perform searches on Bluetooth vulnerability and exposure databases to determine whether the devices are impacts.
||Network Operator; Government
||Cyber Security;Hardware;Network Interoperability;