Connecting communities

WiFi Security Explained

 

Almost every week, we hear that yet another company has been “hacked” due to poor WiFi security practices. Somebody has broken into their data networks and stolen valuable private information like the personal identification, credit card, and banking information of their customers. 

But it’s not just large organizations that get attacked. If you have WiFi in your home, you also have a data network, and you could be vulnerable, too. 

Why would anyone bother targeting my small WiFi network?

If you bank and shop online, a lot of your confidential data travels over your network. You may also keep private information on the computers, phones, or tablets that you use to connect to your WiFi. If your WiFi isn’t secure, all that information could be targeted.

Finally, other people may try to use your WiFi simply to avoid paying for their own. You may think this isn’t an issue if your Internet plan has unlimited data, but having too many devices connected to your WiFi network can slow it down dramatically. 

What kind of WiFi security should I have on my network? 

In your home, you have a gateway (also known as a router, modem or access point) that you use to connect to the Internet. Most devices offer a choice of three ways to secure your network:

  1.  MAC Filtering: Every device in the world that’s capable of connecting to a WiFi network has a unique Media Access Control (MAC) address (sometimes also called a WiFi address), in exactly the same way as you have a unique street address. No two devices have the same MAC address, so theoretically, you could tell your network only to connect devices you know. However, manually entering MAC addresses is a cumbersome process. Whenever you send something from one of your devices, your transmission is unencrypted and includes that device’s MAC address. Hackers who might be monitoring WiFi networks in your neighborhood can easily copy the MAC address and get into your network. There are also other ways they can “spoof” MAC addresses and break into your network. 
  2. WEP: This stands for Wired Equivalent Privacy and, as the name suggests, was designed to give wireless networks protection that’s equivalent to wired networks. This is the oldest WiFi security option, and it requires every device to provide a password before it allows them to connect. Unfortunately, hackers have found too many ways to get past this option. 
  3. WPA2: WiFi Protected Access 2 (WPA2) also requires every device to provide a password to connect. It uses secure encryption to protect your data and is currently the best way to secure your WiFi network. This is the most recommended option, and you should choose a strong password that cannot be easily guessed by other people. (There was a version 1, simply known as WPA. WPA2 is an improvement.) 

Please note: These options can only prevent unauthorized access to your WiFi network. It would be best if you still had anti-virus protection to protect the apps and information on your computers, tablets, and mobile devices. Every time you go online, use social media, browse a website, or open an email, you could be vulnerable to viruses, worms, trojans, malware, and other attacks.

Related

CTC Brings Fiber Internet to Kuna, ID

CTC has built fiber internet to Kuna, ID. As Kuna grows, CTC's fiber network will grow with it. ...

Read More >

NOVEMBER CUSTOMER OF THE MONTH

Meet the Hihn family! Brad, Tom, Amber, Ruger the posing dog, and Brooke. These kids were just bab...

Read More >

How to Enhance Your WiFi Signal

Your guide to automatically finding the best WiFi signal wherever you are in your home. Or Contact C...

Read More >

Tips for Writing an Effective Auto Attendant

Whether your Auto Attendant is the first thing callers hear when calling your business or takes the ...

Read More >

August Customer of the Month

Introducing the Brown family: Jim, Laura and RJ (who is a recent High School graduate). "We rec...

Read More >

Why Small Businesses Need to be Mobile

Mobile working has many benefits. Which is why so many small businesses are ditching their premise p...

Read More >

Search.

Categories.

Recent.

Tag.