Connecting communities

WiFi Security Explained

 

Almost every week, we hear that yet another company has been “hacked” due to poor WiFi security practices. Somebody has broken into their data networks and stolen valuable private information like the personal identification, credit card, and banking information of their customers. 

But it’s not just large organizations that get attacked. If you have WiFi in your home, you also have a data network, and you could be vulnerable, too. 

Why would anyone bother targeting my small WiFi network?

If you bank and shop online, a lot of your confidential data travels over your network. You may also keep private information on the computers, phones, or tablets that you use to connect to your WiFi. If your WiFi isn’t secure, all that information could be targeted.

Finally, other people may try to use your WiFi simply to avoid paying for their own. You may think this isn’t an issue if your Internet plan has unlimited data, but having too many devices connected to your WiFi network can slow it down dramatically. 

What kind of WiFi security should I have on my network? 

In your home, you have a gateway (also known as a router, modem or access point) that you use to connect to the Internet. Most devices offer a choice of three ways to secure your network:

  1.  MAC Filtering: Every device in the world that’s capable of connecting to a WiFi network has a unique Media Access Control (MAC) address (sometimes also called a WiFi address), in exactly the same way as you have a unique street address. No two devices have the same MAC address, so theoretically, you could tell your network only to connect devices you know. However, manually entering MAC addresses is a cumbersome process. Whenever you send something from one of your devices, your transmission is unencrypted and includes that device’s MAC address. Hackers who might be monitoring WiFi networks in your neighborhood can easily copy the MAC address and get into your network. There are also other ways they can “spoof” MAC addresses and break into your network. 
  2. WEP: This stands for Wired Equivalent Privacy and, as the name suggests, was designed to give wireless networks protection that’s equivalent to wired networks. This is the oldest WiFi security option, and it requires every device to provide a password before it allows them to connect. Unfortunately, hackers have found too many ways to get past this option. 
  3. WPA2: WiFi Protected Access 2 (WPA2) also requires every device to provide a password to connect. It uses secure encryption to protect your data and is currently the best way to secure your WiFi network. This is the most recommended option, and you should choose a strong password that cannot be easily guessed by other people. (There was a version 1, simply known as WPA. WPA2 is an improvement.) 

Please note: These options can only prevent unauthorized access to your WiFi network. It would be best if you still had anti-virus protection to protect the apps and information on your computers, tablets, and mobile devices. Every time you go online, use social media, browse a website, or open an email, you could be vulnerable to viruses, worms, trojans, malware, and other attacks.

Related

Reasons Why Your Business Should Replace Their On-Premise Phone System and Move to the Cloud

When an organization looks to change their existing PBX, it is normally a decision that is driven by...

Read More >

CTC Acquires Wilderness Wireless

We are thrilled to announce that CTC has acquired Wilderness Wireless, a local provider of Wireless ...

Read More >

June Customers of the Month

Introducing the very lovely and interesting Paula Cook! She moved to California from England in 1963...

Read More >

April Customer of the Month

Ann & Tristan Walch are the April Customers of the Month!

Read More >

Easter in Hidden Springs!

Easter in Hidden Springs!

Read More >

What is a VoIP Call?

A VoIP call translates audio into data packets and transmits those packets over the internet and the...

Read More >

Search.

Categories.

Recent.

Tag.