{"id":178,"date":"2016-05-16T11:31:49","date_gmt":"2016-05-16T11:31:49","guid":{"rendered":"http:\/\/www.jeocom.co.za\/?p=178"},"modified":"2023-03-20T08:33:17","modified_gmt":"2023-03-20T08:33:17","slug":"wifi-security","status":"publish","type":"post","link":"https:\/\/www.jeocom.co.za\/index.php\/2016\/05\/16\/wifi-security\/","title":{"rendered":"WiFi Security"},"content":{"rendered":"<h3>WiFi Security<\/h3>\n<div class=\"bot-content\"><\/div>\n<div class=\"tab-content ps-container ps-active-y\" data-ps-id=\"06d39ac1-a59b-c70b-7dd0-91a5bab39ceb\">\n<div id=\"tech-2\" class=\"tab-pane active\">This guide is to help you understand the basic terminology and concepts on wireless routing, in some cases your Wireless Router \/ AP may not support some of the security features mentioned below, in that case it is best to read the documentation that came with your router, consult the manual or contact a qualified technician to come set it up.If you intend to use a wireless network be sure to enable security. Internet fraud, bandwidth theft and Identity theft does happen and is on the increase. <span class=\"bold\">If you do not intend to use a wireless network make sure to disable it completely.<\/span><\/p>\n<p>Many People setting up wireless home networks rush through the job to get their Internet connectivity working as quickly as possible. That&#8217;s totally understandable. It&#8217;s also quite risky as numerous security problems can result. Today&#8217;s WiFi products don&#8217;t always help the situation as configuring their security features can be time-consuming and non-intuitive. The recommendations below summarize the steps you should take to improve the security of your home wireless LAN.<\/p>\n<p><span class=\"bold\">Change Default Administrator Passwords (and Usernames)<\/span><br \/>\nAt the core of most Wi-Fi home networks is an access point or router. To set up these pieces of equipment, manufacturers provide Web pages that allow owners to enter their network address and account information. These Web tools are protected with a login screen (username and password) so that only the rightful owner can do this. However, for any given piece of equipment, the logins provided are simple and very well-known to hackers on the Internet. Change these settings immediately.<\/p>\n<p><span class=\"bold\">Turn on (Compatible) WPA \/ WEP Encryption<\/span><br \/>\nAll Wi-Fi equipment supports some form of &#8220;encryption.&#8221; Encryption technology scrambles messages sent over wireless networks so that they cannot be easily read by humans. Several encryption technologies exist for Wi-Fi today. Naturally you will want to pick the strongest form of encryption that works with your wireless network. To function, though, all Wi-Fi devices on your LAN must share the identical encryption settings. Therefore you may need to find a &#8220;lowest common demoninator&#8221; setting.<\/p>\n<p><span class=\"bold\">Change the Default SSID<\/span><br \/>\nAccess points and routers all use a network name called the SSID. Manufacturers normally ship their products with the same SSID set. For example, the SSID for Linksys devices is normally &#8220;Linksys.&#8221; True, knowing the SSID does not by itself allow anyone to break into your network, but it is a start. More importantly, when someone finds a default SSID, they see it is a poorly configured network and are much more likely to attack it. Change the default SSID immediately when configuring your LAN.<\/p>\n<p><span class=\"bold\">Enable MAC Address Filtering<\/span><br \/>\nEach piece of Wi-Fi gear possesses a unique identifier called the &#8220;physical address&#8221; or &#8220;MAC address.&#8221; Access points and routers keep track of the MAC addresses of all devices that connect to them. Many such products offer the owner an option to key in the MAC addresses of their home equipment, that restricts the network to only allow connections from those devices. Do this, but also know that the feature is not so powerful as it may seem. Hacker software programs can fake MAC addresses easily.<\/p>\n<p><span class=\"bold\">Disable SSID Broadcast<\/span><br \/>\nIn Wi-Fi networking, the access point or router typically broadcasts the network name (SSID) over the air at regular intervals. This feature was designed for businesses and mobile hotspots where Wi-Fi clients may come and go. In the home, this feature is unnecessary, and it increases the likelihood an unwelcome neighbour or hacker will try to log in to your home network. Fortunately, most Wi-Fi access points allow the SSID broadcast feature to be disabled by the network administrator.<\/p>\n<p><span class=\"bold\">Do Not Auto-Connect to Open Wi-Fi Networks<\/span><br \/>\nConnecting to an open Wi-Fi network such as a free wireless hotspot or your neighbour&#8217;s router exposes your computer to security risks. Although not normally enabled, most computers have a setting available allowing these connections to happen automatically without notifying you (the user). This setting should not be enabled except in temporary situations.<\/p>\n<p><span class=\"bold\">Assign Static IP Addresses to Devices<\/span><br \/>\nMost home networkers gravitate toward using dynamic IP addresses. DHCP technology is indeed quick and easy to set up. Unfortunately, this convenience also works to the advantage of network attackers, who can easily obtain valid IP addresses from a network&#8217;s DHCP pool. Turn off DHCP on the router or access point, set a fixed IP address range, then set each connected device to match. Use a private IP range (like 10.0.0.x) to prevent computers from being directly reached from the Internet.<\/p>\n<p><span class=\"bold\">Enable Firewalls on Each Computer and the Router<\/span><br \/>\nModern routers contain built-in firewall capability, but the option exists to disable them. Ensure that your router&#8217;s firewall is turned on. Additionally, consider installing and running personal firewall software on each computer connected to the router for extra protection.<\/p>\n<p><span class=\"bold\">Position the Router or Access Point Safely<\/span><br \/>\nWi-Fi signals normally reach to the exterior of a home. A small amount of &#8220;leakage&#8221; outdoors is not a problem, but the further this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often reach through neighbouring homes and into streets, for example. When installing a wireless home network, the position of the access point or router determines its reach. Try to position these devices near the centre of the home rather than near windows to minimize leakage.<\/p>\n<p><span class=\"bold\">Turn off the Network during Extended Periods of Non-Use<\/span><br \/>\nThe ultimate in security measures, shutting down the network will most certainly prevent outside hackers from breaking in! While impractical to turn off and on the devices frequently, at least consider doing so during travel or extended periods offline. Computer disk drives have been known to suffer from power cycle wear-and-tear, but this is not a concern for broadband modems and routers.<\/p>\n<p>If you have any problems setting up your Router, Internet Connection or Mail account please feel free to call us anytime on 0878083211.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>WiFi Security This guide is to help you understand the basic terminology and concepts on wireless routing, in some cases your Wireless Router \/ AP may not support some of the security features mentioned below, in that case it is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-178","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.jeocom.co.za\/index.php\/wp-json\/wp\/v2\/posts\/178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jeocom.co.za\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jeocom.co.za\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jeocom.co.za\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jeocom.co.za\/index.php\/wp-json\/wp\/v2\/comments?post=178"}],"version-history":[{"count":1,"href":"https:\/\/www.jeocom.co.za\/index.php\/wp-json\/wp\/v2\/posts\/178\/revisions"}],"predecessor-version":[{"id":179,"href":"https:\/\/www.jeocom.co.za\/index.php\/wp-json\/wp\/v2\/posts\/178\/revisions\/179"}],"wp:attachment":[{"href":"https:\/\/www.jeocom.co.za\/index.php\/wp-json\/wp\/v2\/media?parent=178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jeocom.co.za\/index.php\/wp-json\/wp\/v2\/categories?post=178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jeocom.co.za\/index.php\/wp-json\/wp\/v2\/tags?post=178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}