fbpx
Blog

JensenIT Blog

JensenIT has been serving the Illinois area since 1991, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Tip of the Week: Optimizing Your Business Wi-Fi’s Security

Tip of the Week: Optimizing Your Business Wi-Fi’s Security

Wi-Fi connectivity is a remarkable technology when you really think about it, and it has fundamentally changed how we work today. What hasn’t changed, unfortunately, is that hackers and cybercriminals will try to use this technology to their own advantage. Therefore, let’s discuss a few relatively simple ways that you can improve your wireless network’s overall security.

First and Foremost, Update the Access Credentials

It’s no secret that networking hardware comes with factory-default device names and passwords preconfigured. Many may make the mistake of simply putting these devices in place and not changing these defaults—a mistake that leaves the network fundamentally insecure.

Here’s the thing: generally speaking, the default credentials for just about any device can be found online. So, if a cybercriminal happens to find out what model of device you have—not difficult if you don’t change the displayed device name, or SSID, it becomes a simple matter to look up the keys to the castle. Change the device’s displayed name, change the password, and you’re already in better shape. For extra security, set your router to not broadcast the SSID at all, and have your team members type in the name of the network they’re trying to access.

Create Dedicated Networks for Different Purposes

Modern networking hardware can commonly support numerous discrete networks simultaneously, meaning that different devices being used for different needs and different access permissions don’t need to share the same network. This hugely benefits your security, as it helps ensure that a visitor to your business would find it much more challenging to introduce a threat to your operational network, whether or not they meant to do so.

Creating a dedicated network for any Internet of Things devices is recommended for similar reasons. These devices, while undeniably handy, can potentially serve as an access point for a threat. Keeping them in a separate network helps protect the rest of your network and assets from any unpleasant influences.

Limit Which Devices Can Access Your Network

For especially stringent Wi-Fi security, there’s another setting for you to consider. Every device that can connect to Wi-Fi will have its own hardware address, known as the Media Access Control/MAC address. See if you can set your router to only provide network access to devices with MAC addresses that you’ve approved beforehand. That way, you can confirm precisely which devices can be used on the network, reducing the chances that a threat is carried in on a mobile or otherwise Internet-connected device.

JensenIT is here to help you make the most of all of your technology, productively and securely. Give us a call at (847) 803-0044 to learn more about what we can do.

Not Even Voicemails are Safe from Phishing
How You Can Keep Prying Eyes Off the Emails You Se...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Monday, December 23, 2024

Captcha Image

Customer Login


Latest Blog

If you want your business to succeed, you need to take care of your employees, but businesses sometimes let this important task slip in the throes of the day-to-day. Deloitte estimates that around 8 out of every 10 wage workers show signs of burnout. So the question then becomes… What are you doing about it?

Contact Us

Learn more about what JensenIT can do for your business.

JensenIT
1689 Elk Blvd
Des Plaines, Illinois 60016

Sign up for our Newsletter!

Hey! Before you go, subscribe to our newsletter for IT tech tips and advice!