Home Router Security Guide

484 KB | 3 files | null PDF

Organizations of all sizes continue to rely on consumer networking equipment, despite the well-documented security and management risks such hardware poses. This guide will help you safely trim a few dollars from your networking budget by using "home" routers.

“Home” routers pop up everywhere, from the actual home to good-sized organizations and businesses that want to cut corners on wireless networking expenses. Amazingly, some best practices involved in configuring and securing these access points still are not practiced, despite more than a decade of warnings about what a bad idea it is to leave your SSID set to “default.”

This guide covers all the basics when it comes to securing home networking equipment. Among the pointers you’ll find: use a directional antenna to limit the range of your WLAN. If hackers can’t get a signal from the parking lot, you’ll be that much safer.

Included in this zip file are:

  • HomeRouterSecurity.pdf
  • Intro Doc.pdf
  • Terms and Conditions.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) and information sharing and collaboration with state and local government, industry and international partners. US-CERT interacts with federal agencies, industry, the research community, state and local governments, and others to disseminate reasoned and actionable cyber security information to the public.

All IT Downloads from US-CERT» | Visit US-CERT »
Related IT Downloads

Strategy2.jpg Case Studies in Strategic Planning

Chapter 1 delves into the first four stages of systematic strategic planning, including clarifying current conditions, identifying competitive advantages, defining opportunities and developing strategies. ...  More >>

IT_Man68 Stakeholder Engagement: The Game Changer for Program Management

The excerpt from chapter 5 focuses on leveraging stakeholders to prepare your organization for change. This is an essential practice that ensures a successful product delivery. ...  More >>

Checkbox1 National Checklist Program for IT Products – Guidelines for Checklist Users and Developers

This document makes recommendations for how users and developers should select checklists from the NIST National Checklist Repository, evaluate and test checklists, and apply them to IT products. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.