Connecting communities

WiFi Security Explained

 

Almost every week, we hear that yet another company has been “hacked” due to poor WiFi security practices. Somebody has broken into their data networks and stolen valuable private information like the personal identification, credit card, and banking information of their customers. 

But it’s not just large organizations that get attacked. If you have WiFi in your home, you also have a data network, and you could be vulnerable, too. 

Why would anyone bother targeting my small WiFi network?

If you bank and shop online, a lot of your confidential data travels over your network. You may also keep private information on the computers, phones, or tablets that you use to connect to your WiFi. If your WiFi isn’t secure, all that information could be targeted.

Finally, other people may try to use your WiFi simply to avoid paying for their own. You may think this isn’t an issue if your Internet plan has unlimited data, but having too many devices connected to your WiFi network can slow it down dramatically. 

What kind of WiFi security should I have on my network? 

In your home, you have a gateway (also known as a router, modem or access point) that you use to connect to the Internet. Most devices offer a choice of three ways to secure your network:

  1.  MAC Filtering: Every device in the world that’s capable of connecting to a WiFi network has a unique Media Access Control (MAC) address (sometimes also called a WiFi address), in exactly the same way as you have a unique street address. No two devices have the same MAC address, so theoretically, you could tell your network only to connect devices you know. However, manually entering MAC addresses is a cumbersome process. Whenever you send something from one of your devices, your transmission is unencrypted and includes that device’s MAC address. Hackers who might be monitoring WiFi networks in your neighborhood can easily copy the MAC address and get into your network. There are also other ways they can “spoof” MAC addresses and break into your network. 
  2. WEP: This stands for Wired Equivalent Privacy and, as the name suggests, was designed to give wireless networks protection that’s equivalent to wired networks. This is the oldest WiFi security option, and it requires every device to provide a password before it allows them to connect. Unfortunately, hackers have found too many ways to get past this option. 
  3. WPA2: WiFi Protected Access 2 (WPA2) also requires every device to provide a password to connect. It uses secure encryption to protect your data and is currently the best way to secure your WiFi network. This is the most recommended option, and you should choose a strong password that cannot be easily guessed by other people. (There was a version 1, simply known as WPA. WPA2 is an improvement.) 

Please note: These options can only prevent unauthorized access to your WiFi network. It would be best if you still had anti-virus protection to protect the apps and information on your computers, tablets, and mobile devices. Every time you go online, use social media, browse a website, or open an email, you could be vulnerable to viruses, worms, trojans, malware, and other attacks.

Related

Service Problems?

Be like Chuck! Call us up!

Read More >

Contactless Food Drive for the Meridian Food Bank

Help support Treasure Valley families in need by dropping off canned goods at our CTC Meridian locat...

Read More >

November Customers of the Month

Meet the beautiful Benfield family, our November Customers of the Month! From left to right are Chey...

Read More >

June Customers of the Month

Introducing the very lovely and interesting Paula Cook! She moved to California from England in 1963...

Read More >

August Customers of the Month

This month, we give you Scott & Jami Hoke and their two beautiful daughters Rikki & Ashtyn. They lik...

Read More >

August Customer of the Month

Introducing the Brown family: Jim, Laura and RJ (who is a recent High School graduate). "We rec...

Read More >

Search.

Categories.

Recent.

Tag.