Facebook
Name
Email
Phone
Message

How to Secure & Setup Home Wireless Networks

Home Wireless Networks

Do you use a wireless router for your business? Is your router secure and password protected? Can anyone connect to your wireless router? Your home based business needs security measures set up for your wireless network. Today, many neighborhoods are scanned, by someone using a receiver, which picks up unsecured wireless signals. They gain access to your home network through your router. Once inside, they scan your computers for information, accounts, passwords, and your proprietary business information.

Most home business owners don’t understand the technical side of router security and how to set their wireless routers. This makes your wireless LAN’s the target for information predators. Securing your home network requires just a little knowledge and understanding how the wireless setting works.

10 Steps To Setup Network Router And Secure Network Against Predators

  1. Wireless routers come with a setup CD to configure your router. Use the setup CD to access your wireless router.
  2. The first setting to change on your router is the factor password. Most router companies set the password as “password”. Give your router a new password using upper/lower case letters, numbers, and special characters. Stay away from names and street address. A good example of a password would be “Tc68/D@7” Make your password 10 to 12 characters long, this makes entering your router difficult.
  3. Enable the 128-bit Wired Equivalency Privacy encryption (WEP) for the router and network cards. Every other month change your WEP code. Update your computer or router if they don’t support the 128-bit WEP encryption. The WEP inside your router is, the only minimal security precaution offered.
  4. Change your SSID setting on your router from the factory default. The SSID setting is the password that allows access to your network. When changing your SSID setting, never use, your name, address, passwords for other accounts, phone numbers, or birthdays. Always enter characters in a string that use upper/lower case letter, number, and special characters.
  5. Setup the router access point to not broadcast your SSID setting or name.
  6. Block the router from anonymous Internet requests and pings.
  7. Disable your P2P connections.
  8. Enable the MAC filtering on your router.
  9. Enable the network router, firewall and disable the demilitarized zone function.
  10. Enable the client firewalls for all computers in your network.
  11. Check your router using the CD provided for firmware updates. When new firmware is available update the firmware on your router.
  12. Secure your router in a hidden location, making it impossible for anyone to reset.
  13. When selecting the location for your router, remember the Wifi signal is 100 feet. Place the router closer to walls or in the middle of your room away from windows.

*Image courtesy Flickr creative commons

Recommended Posts | Network Management

Best Backup Solution
2110

What is the Best Backup Solution: Online or Local?

Users all face the problems when it comes to backing up and storing their data. Cloud offers online backup service to store data safely. There are many concerns when it comes to trusting data to an online backup service. One of the major concerns is security and paying a fee to store backup online ...
Home Networking
1899

Home Networking: The Wired Option Still Excels

Devices demanding WiFi capability are growing, but wired setups remain the best home networking option. The future of home networking includes a strong wireless network backed by organized and up-to-date wired connections. Wired + Wireless. Dispersing Connections. Cabling: Category Vs Fiber Optic ...
Adware Protection
1794

Keeping Your Business Safe From Adware

Adware is becoming one of the top malware problems today in businesses around the world. Before, businesses only had to worry about protecting their computers and networks in their organization. Today it goes way beyond the doors of your company. With all the new BYOD programs, cloud computing ...
Data Breach Defense Plan
1449

7 Components of a Business Data Breach Defense Plan

FTC and Data Breaches by Humans Development. Most businesses have confidential information stored, such as client or employee addresses, phone numbers, social security numbers, dates of birth, credit card information. A data breach could result in theft of client or employee confidential information ...