dcsimg

Nine Steps to Securing Your Wireless Network

  • Nine Steps to Securing Your Wireless Network-

    Hackers cannot access a wireless router when it is shut down. If you turn the router off when you're not using it, you limit the amount of time that it is susceptible to a hack.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11

Nine Steps to Securing Your Wireless Network

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
  • Nine Steps to Securing Your Wireless Network-8

    Hackers cannot access a wireless router when it is shut down. If you turn the router off when you're not using it, you limit the amount of time that it is susceptible to a hack.

Increasingly, computer users interested in convenience and mobility are accessing the Internet wirelessly. Today, business travelers use wireless laptops to stay in touch with the home office; vacationers beam snapshots to friends while still on holiday; and shoppers place orders from the comfort of their couches. A wireless network can connect computers in different parts of your home or business without a tangle of cords and enable you to work on a laptop anywhere within the network's range.

The downside of a wireless network is that, unless you take certain precautions, anyone with a wireless-ready computer can use your network. That means your neighbors, or even hackers lurking nearby, could "piggyback" on your network, or even access the information on your computer. And if an unauthorized person uses your network to commit a crime or send spam, the activity can be traced back to your account.

Fortunately, there are steps you can take to protect your wireless network and the computers on it. As no one step is a complete fix, taking all of the following steps outlined by OnGuard Online will help you be more secure.

These additional resources are available for free download from the IT Business Edge Knowledge Network:

More Slideshows:


12 Top Social Media Policies from the Knowledge Network The top social media policies and templates from the IT Business Edge Knowledge Network.

10 Top Google Apps for Project Management 10 of the highest-rated apps for project management from the Google Apps Marketplace.


Five Warning Signs Your Security Policy Is Lacking A weak security policy can lead to catastrophic results.