Wednesday, February 6, 2013

(6 Feb 2013) InfoWatch - Digital Citizenship [DC 7]

Wireless Security

If someone is able to access your wireless connection, they may even be able to access the files on the computer. Hackers may exploit unsecured wireless network to compromise the computer or perform malicious activities in your name, such as sending spam emails or downloading illegal content.

Things to remember in securing your wireless network at home with the following settings:
  • Enable WPA2 encryption with strong passphrase
    Try to use a complex and long passphrase as your encryption key to ensure that your entire wireless setup is secure.
  • Check and control the devices that are connected to your wireless network
    This can be done by checking the MAC address filtering settings.
  • Disable SSID broadcast The SSID is essentially the name assigned to your network. SSID is broadcasted by your wireless router for devices to connect to your wireless network. You have the option to disable the broadcast if you do not want your wireless network name to be listed in devices’ wireless network search.
  • Change the default wireless router administrator username and password
    As with any password, make it a rule of thumb to have at least 8 alphanumeric characters in upper and lowercase, numbers and symbols for your password.
We will learn about securing wireless at outdoor places in the subsequent post.

3 comments:

  1. Soft copies of documents can be unsecure with these hackers around. Good that this blog is posted. It reminded me of stuff that I must consider. Hope things will work out well on my network now because I can’t afford to lose the docs on my PC.


    Ruby Badcoe

    ReplyDelete
  2. This blog post is very informative on how to secure ur wireless rourter. thank u for the help full post.

    ReplyDelete
  3. Data storage should be secured at all times especially when the data are very confidential. For some industries, they use the cloud storage system, where an administrator manages the data to be stored. I guess this can be very effective to protect data against hackers.

    Manda Maldanado

    ReplyDelete

Note: Only a member of this blog may post a comment.