SlideShare a Scribd company logo
Most of us are familiar about connecting our cell phones, laptop or tablets to
wireless networks. Wireless connections are established by creating an internet
access point such as modem or router which further sends the signal to the Wi-Fi
enabled devices. If you are not aware about how to secure your wireless networks,
then you need to gear up and protect it since hackers can find their way to launch
malicious attacks on your computer through your wireless network.
Empower your encryption
If you are looking for ways to secure your wireless network then enable encryption
on your router. This will be the first step that most experts will prefer to do.
Information will be scrambled while encrypting which is contained in the messages
between the router and the device. Restriction will be imposed on open access from
the other user. Wired Equivalent Privacy and Wi–Fi Protected Access are two types
of encryption method. It depends upon the user that which method they choose to
protect their wireless network.
Plenty of flaws have been shown by WEP in the past few years which was
established in late 90’s. Since WEP is better than WPA, but most people would
likely choose WPA 2 as it would be a better choice for the encryption method
because it is more secure then the WEP. Choose the password after you have
enabled your encryption. Try to keep the password longer as it will be harder for
the hacker to guess. Keep in mind that the ways of enabling your encryption on
the router will vary according to the manufacturer and model so, refer to their
website if you face trouble.
Firewall need to be turned ON
The best way to stop unwelcome intrusions to your network is to turn on your
router’s firewall. Most of the wireless routers come with the firewalls built in, but
they have to be turned on. So, it is necessary to check out whether the firewall is
actually on or not.
Access the channel using MAC Address
MAC addresses have to do nothing with apple products. In a wireless networks,
MAC stands for Machine access code which is a unique identification for each
device.
Filter access option will be provided by most of the routers through which only
those device will be able to access the Wi-Fi who have been preapproved by you.
Though the MAC address of Windows operating system and MAC OS X varies but
it is not difficult to find either. It might be possible for the hackers to clone a MAC
address in order to fool router, so filtering the MAC address should be used in
tandem with the security measures.
Default name of the network should be changed
Service set Identifier is known as the network’s name. List of the name of each
network will be provided as you connect to the wireless network. Default name is
given to the routers so it is optional to provide your own name or not. The network
should not be named after anything personal or a family member.
Change default address
Wireless routers come with preset passwords. It will be a easy job for hackers to
guess the password of your network as most of the routers come up with the default
password from the factory. It will be harder for people to crack down the password
if your password contains upper and lower case letters, numbers and symbols.
Avoid Remote Administration
Security modifications will be made through wired connection as you disallow
remote administration. People will not be able to change the settings of your Wi-
Fi, if they are going to access your Wi-Fi. This option is located in your routers
administrative settings.
These tips will provide you better understanding of securing of your Wi-Fi
security in order to avoid the leakage of your personal information.
Article Resource: http://itsupoortfortworth.jimdo.com/2015/11/17/tips-for-
securing-your-wireless-network/

More Related Content

Recently uploaded

Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportFuture of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Dubai Multi Commodity Centre
 
zidauu _business communication.pptx /pdf
zidauu _business  communication.pptx /pdfzidauu _business  communication.pptx /pdf
zidauu _business communication.pptx /pdf
zukhrafshabbir
 

Recently uploaded (20)

Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)
 
How to Maintain Healthy Life style.pptx
How to Maintain  Healthy Life style.pptxHow to Maintain  Healthy Life style.pptx
How to Maintain Healthy Life style.pptx
 
Cracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxCracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptx
 
USA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdfUSA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdf
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Pitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckPitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deck
 
Luxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | ShajaraLuxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
 
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
 
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
 
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical TrialsSalesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
 
FEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service Lightning
 
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportFuture of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
 
IPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceIPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best Service
 
zidauu _business communication.pptx /pdf
zidauu _business  communication.pptx /pdfzidauu _business  communication.pptx /pdf
zidauu _business communication.pptx /pdf
 
Hyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings releaseHyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings release
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.
 
State of D2C in India: A Logistics Update
State of D2C in India: A Logistics UpdateState of D2C in India: A Logistics Update
State of D2C in India: A Logistics Update
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Tips for securing your wireless network

  • 1. Most of us are familiar about connecting our cell phones, laptop or tablets to wireless networks. Wireless connections are established by creating an internet access point such as modem or router which further sends the signal to the Wi-Fi enabled devices. If you are not aware about how to secure your wireless networks, then you need to gear up and protect it since hackers can find their way to launch malicious attacks on your computer through your wireless network. Empower your encryption If you are looking for ways to secure your wireless network then enable encryption on your router. This will be the first step that most experts will prefer to do. Information will be scrambled while encrypting which is contained in the messages between the router and the device. Restriction will be imposed on open access from the other user. Wired Equivalent Privacy and Wi–Fi Protected Access are two types of encryption method. It depends upon the user that which method they choose to protect their wireless network.
  • 2. Plenty of flaws have been shown by WEP in the past few years which was established in late 90’s. Since WEP is better than WPA, but most people would likely choose WPA 2 as it would be a better choice for the encryption method because it is more secure then the WEP. Choose the password after you have enabled your encryption. Try to keep the password longer as it will be harder for the hacker to guess. Keep in mind that the ways of enabling your encryption on the router will vary according to the manufacturer and model so, refer to their website if you face trouble. Firewall need to be turned ON The best way to stop unwelcome intrusions to your network is to turn on your router’s firewall. Most of the wireless routers come with the firewalls built in, but they have to be turned on. So, it is necessary to check out whether the firewall is actually on or not. Access the channel using MAC Address MAC addresses have to do nothing with apple products. In a wireless networks, MAC stands for Machine access code which is a unique identification for each device.
  • 3. Filter access option will be provided by most of the routers through which only those device will be able to access the Wi-Fi who have been preapproved by you. Though the MAC address of Windows operating system and MAC OS X varies but it is not difficult to find either. It might be possible for the hackers to clone a MAC address in order to fool router, so filtering the MAC address should be used in tandem with the security measures. Default name of the network should be changed Service set Identifier is known as the network’s name. List of the name of each network will be provided as you connect to the wireless network. Default name is given to the routers so it is optional to provide your own name or not. The network should not be named after anything personal or a family member. Change default address Wireless routers come with preset passwords. It will be a easy job for hackers to guess the password of your network as most of the routers come up with the default password from the factory. It will be harder for people to crack down the password if your password contains upper and lower case letters, numbers and symbols.
  • 4. Avoid Remote Administration Security modifications will be made through wired connection as you disallow remote administration. People will not be able to change the settings of your Wi- Fi, if they are going to access your Wi-Fi. This option is located in your routers administrative settings. These tips will provide you better understanding of securing of your Wi-Fi security in order to avoid the leakage of your personal information. Article Resource: http://itsupoortfortworth.jimdo.com/2015/11/17/tips-for- securing-your-wireless-network/