dcsimg

Nine Steps to Securing Your Wireless Network

  • Nine Steps to Securing Your Wireless Network-

    The identifier for your router is likely to be a standard, default ID assigned by the manufacturer to all hardware of that model. Even if your router is not broadcasting its identifier to the world, hackers know the default IDs and can use them to try to access your network. Change your identifier to something only you know, and remember to configure the same unique ID into your wireless router and your computer so they can communicate. Use a password that's at least 10 characters long: The longer your password, the harder it is for hackers to break.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11

Nine Steps to Securing Your Wireless Network

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
  • Nine Steps to Securing Your Wireless Network-5

    The identifier for your router is likely to be a standard, default ID assigned by the manufacturer to all hardware of that model. Even if your router is not broadcasting its identifier to the world, hackers know the default IDs and can use them to try to access your network. Change your identifier to something only you know, and remember to configure the same unique ID into your wireless router and your computer so they can communicate. Use a password that's at least 10 characters long: The longer your password, the harder it is for hackers to break.

Increasingly, computer users interested in convenience and mobility are accessing the Internet wirelessly. Today, business travelers use wireless laptops to stay in touch with the home office; vacationers beam snapshots to friends while still on holiday; and shoppers place orders from the comfort of their couches. A wireless network can connect computers in different parts of your home or business without a tangle of cords and enable you to work on a laptop anywhere within the network's range.

The downside of a wireless network is that, unless you take certain precautions, anyone with a wireless-ready computer can use your network. That means your neighbors, or even hackers lurking nearby, could "piggyback" on your network, or even access the information on your computer. And if an unauthorized person uses your network to commit a crime or send spam, the activity can be traced back to your account.

Fortunately, there are steps you can take to protect your wireless network and the computers on it. As no one step is a complete fix, taking all of the following steps outlined by OnGuard Online will help you be more secure.

These additional resources are available for free download from the IT Business Edge Knowledge Network:

More Slideshows:


12 Top Social Media Policies from the Knowledge Network The top social media policies and templates from the IT Business Edge Knowledge Network.

10 Top Google Apps for Project Management 10 of the highest-rated apps for project management from the Google Apps Marketplace.


Five Warning Signs Your Security Policy Is Lacking A weak security policy can lead to catastrophic results.