While wireless network routers are great, they are not as secure as hooking up your computer directly with a cable. Other people can use your wireless routers and hook up to the internet. They can also access your personal information and be aware of things such as your financial information and other things that you don’t want other people to have access to.
Hackers are notorious for breaking into unsecured connections. You don’t have to be very technologically advanced to do it, either. Even someone with limited technical skills can use your router. This is especially true if you do not set a password or make your connection secure.
Sometimes, people just want to use your router to access the internet themselves. Other times, they want to steal information or send you viruses. Nobody wants to deal with that. A virus can crash your computer, sometimes to the point that it is not salvageable. But how do you make sure that your internet security is good when you use wireless internet? Too many individuals set up their wireless network and forget about the security. This can be a severe oversight as people can easily access your details and is a cause of fraud. Below, I give you a few actions you can take to make sure your wireless network is secure.
1. Router Location
In the case of a wireless connection, anyone within the broadcast range of the network may be able to look at any data contained within the network. Put your wireless router in a part of your house where the signal will not travel too far beyond the boundaries of your home. If your house is near a street, do not put your router too near this part of your house. Also, if you are going on vacation or are going to be away for a prolonged period, you should turn your router off while you are gone.
2. Passwords & Usernames
Weak passwords and usernames are easily exploitable to a hacker trying to get gain access to your computer systems through your wireless network. A lot of wireless routers allow you to gain access to their setup with your internet web browser. Make certain to change the default password and username that allows you to monitor your router to prevent undesirable access to it. If you do not, almost anybody can breach your network. You can quickly find assistance on making secure passwords here.
Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months. Clifford Stoll
3. Static IP’s
Another technique that is frequently utilized to protect wireless networks is static IPs. Turn DHCP off. Networks are far safer if the IP addresses of all computer systems on a network are set manually.
Change the default name of your router. The name of your router or SSID (Service Set Identifier) will be set to a default name by the manufacturer. Change the name to something unique that only you know. Attackers may target wireless networks with default names on the possibility that these networks are less secure than others.
All Wi-Fi equipment will have some form of encryption including WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and WPA2 (Wi-Fi Protected Access 2). WPA2 should be used if its available as its more secure than WPA and WEP.
6. MAC Address
Every network capable computer system will have at least one MAC address. Allowing access to your wireless network based on MAC addresses will filter out unfavorable users and network capable devices. It is not foolproof. However, it will dissuade most potential hackers.
Setting up and then activating a firewall is an additional way to protect your internet security. This is important whether you are using a wireless router or not. It is important to remember that the firewall is only part of your computer security. For example, a firewall will not scan or remove viruses from your computer.
These are just some of the steps you can take to make your computer more secure. There are many computer networks out there that are badly protected. The actions explained above should not take long to perform. While they may not make your computers 100% secure, they are most likely to impede any potential hackers.