312-253-4321    Get SUPPORT

Alchetec Blog

By accepting you will be accessing a service provided by a third-party external to https://www.alchetec.com/

Building a Secure Wi-Fi Network

Building a Secure Wi-Fi Network

Maintaining network security is always a priority for the security-minded company, but if your organization’s strategy is to fly under the radar, you need a new plan. No business is too small to be a victim of a network breach. What most people who are tasked with coming up with a network security strategy for a small business don’t always realize is that threats are everywhere. Today, we’re going to take a look at planning a secure and reliable Wi-Fi strategy that doesn’t inherently add to your business’ risk. 

It isn’t always the IT department that pushes for wireless network implementation, but it continues to happen at most places of business. Luckily for all parties, today’s wireless internet is easier to install, is faster than ever, and works to protect network security better than ever before, once it is set up correctly. Let’s go step-by-step.

Step #1 - Identify Need

There are very distinct pros and cons to implementing a wireless network for your business. On one hand a wireless network is much more cost effective. It enhances mobility, which can fuel a more flexible and collaborative work environment. These are two very good reasons to implement one, but there are some detriments, especially considering security. It’s true that data sent over a Wi-Fi connection is more susceptible to threat than through a wired connection.  Luckily, wireless is more secure than it was in the past, but knowing you will have to keep a more vigilant eye on wirelessly transmitted data is a consideration you have to account for. 

Step #2 - Coverage Area

Supposing that you do see the benefits in implementing a wireless network, the next step is to identify what area needs to be covered by the wireless network. Do you want your Wi-Fi to reach outside the confines of your building? Ideally, you will want to examine just where you need coverage and come up with a general idea where your access points will be.

Step #3 - Bandwidth

Before you can start building your Wi-Fi network you need to determine how much bandwidth you are going to need to facilitate the users on your new wireless network. Are your users bandwidth-hungry? Are they using cloud platforms or uploading and downloading data constantly? Estimating your organization's bandwidth needs will go a long way toward dictating how many access points are needed. 

Step #4 - Hardware

The hardware you will need to implement your new Wi-Fi network is minimal, but identifying exactly what you need to fuel the platform you’ve planned is a big step. Part of selecting the hardware you need is deciding which wireless standard to follow. Of course, there is some interoperability between standards, but for your business’ benefit, planning on using a single standard is best practice. The most prevalent for high speed wireless transmission are 802.11a and 802.11g. 802.11b delivers slower Internet speeds, but also reduces the prices of the hardware substantially.

Step #5 - Implementation

Setting up the network may be more work than you may think, but it’s true that some places can just put a single wireless router on the wall next to the modem and cover everything the business needs it to cover. If this doesn’t describe your business, you will want to do a site survey to test the Wi-Fi’s reach so you can put the hardware in the right spots.

Step #6 - Security

Before you let anyone access your new Wi-Fi network, you will absolutely want to set up the security you plan on using. At Alchetec, we suggest that you consult an IT expert when implementing security. This is because as much as you can understand the best practices needed to control a system’s security, an expert has the experience needed to set up the network security options properly, and can work to integrate it with your other network security efforts.

If you insist on doing this type of thing yourself, there are a couple of things you need to do. They include:

  1. Change your router’s admin password - The first step in most security practices is changing the password. It is no different here.
  2. Turn off Service Set Identifier (SSID) broadcasting - This doesn’t allow passersby to see that your wireless network is up and available. 
  3. Change default SSID - Since a lot of factory-provided SSID values are available, you can avoid them altogether by changing the SSID login name.
  4. Enable MAC address filtering - This gives you control over which users have access to what access points. 
  5. Add EAP authentication and enable encryption - Requires secure authentication from each user on the network. 
  6. Consider virtual private networking - If you need extra security, a virtual private network connection can provide access to your network when you are out of the WLAN’s reach. 

Step #7 - Deploy

Once your Wi-Fi is properly secured, it is time to start adding your users to it. Again, the technicians at Alchetec can save a lot of time and effort with the management of this process. Our team would be able to properly set up the secure Wi-Fi network using the SSID information and the MAC address filter that was set up earlier, effectively whitelisting the devices you want to allow, instead of blacklisting all the devices you don’t.

If you would like help setting up your business’ Wi-Fi connection call the experts at Alchetec today at 312-253-4321.

Tip of the Week: Extend Your IT Budget
The Endless Line of Costs from a Data Breach


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 01 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Productivity Business Computing Cloud Network Security Data Data Backup IT Services Privacy Hosted Solutions IT Support Malware Software Internet Email Hackers Outsourced IT Efficiency Microsoft Data Recovery Innovation Computer Business Hardware Business Continuity Small Business Cloud Computing Mobile Devices Cybersecurity Productivity Managed IT Services Managed IT Services Google Tech Term Ransomware Backup User Tips Upgrade Collaboration Communication Phishing Windows 10 Business Management VoIP Workplace Tips IT Support Smartphones Android Paperless Office Disaster Recovery Remote Monitoring Mobile Device Managed Service Office 365 Data Management Managed Service Provider Quick Tips Managed IT Smartphone Server Communications Internet of Things Social Media Facebook Passwords Encryption Network Save Money Browser Wi-Fi Virtualization Help Desk Holiday BDR Artificial Intelligence Miscellaneous Saving Money Healthcare Document Management Windows 10 BYOD Windows 7 Business Technology Compliance Health Government Training Windows Applications Employer-Employee Relationship Automation Password Remote Work Vendor Management Risk Management Microsoft Office Laptops Office Chrome SaaS Storage Telephone Systems Data Security Infrastructure Bandwidth Two-factor Authentication File Sharing Tip of the week Data loss Avoiding Downtime Unified Threat Management Blockchain Recovery Going Green Processor Apps Information Antivirus Mobility Redundancy Maintenance Vulnerability Users IT Management Scam Analytics Project Management Proactive Hosted Solution Computers Robot Access Control Wireless Meetings OneDrive Router Virtual Private Network Mobile Device Management RMM Gmail Computing Firewall App Software as a Service Tablet IoT Files Money Data Storage Gadgets Regulations Company Culture Customer Relationship Management Politics Big Data Flexibility Website Word Machine Learning Virtual Reality IT Service VPN Work/Life Balance Bring Your Own Device Solid State Drive Outlook Unified Communications Covid-19 Networking Employees Upgrades Managed Services Provider Management Smart Technology Employee-Employer Relationship Downtime Remote Monitoring and Management Digital Payment Net Neutrality Professional Services Display HIPAA Alert Identity Theft How To Remote Workers Licensing Augmented Reality Operating System Internet Exlporer Hard Drive Monitors Social Network Samsung Assessment Cooperation File Management Time Management The Internet of Things Search Patch Management Apple Mobile Security Uninterrupted Power Supply How To Consultation Chromebook Payment Cards Twitter Monitoring Recycling Network Management Electronic Health Records Social Co-Managed IT Utility Computing Server Management Remote Computing Customer Service Settings Printing Dark Web Consulting Managed Services Electronic Medical Records Mobile Office Cyberattacks Voice over Internet Protocol Chatbots Cables Optimization Trending Legislation Test IT Budget User Management Emoji G Suite Cabling Wearable Technology Enterprise Content Management IT Solutions Mobile VoIP Websites Processors Spam Digital Data Warehousing Smart Tech Current Events Biometric PowerPoint Computing Infrastructure Vendor USB Data Breach Computer Care WannaCry Database Management Legal IT Assessment Law Enforcement Specifications Procurement Private Cloud Read Only Taxes Hard Disk Drive Identity Solid State Drives Personal Information Virtual Machines Unsupported Software Cost Management Batteries Google Drive Vulnerabilities Cyber security Statistics SharePoint Wires Zero-Day Threat Spyware 3D Printing Microsoft Excel Connectivity Projects Firefox Update Gamification Point of Sale Alerts Enterprise Resource Planning Smart Devices Technology Laws Instant Messaging Manufacturing Distributed Denial of Service Modem GDPR Digitize Mail Merge Gadget Security Cameras Dark Data Techology Transportation Social Engineering Options Credit Cards Shortcut Virus WPA3 Mobile Data E-Commerce Virtual Assistant Disaster IT Technicians Geography Bluetooth Downloads Tech Support Backup and Disaster Recovery Return on Investment Outsource IT Lenovo Wireless Technology 5G Mobile Sensors Heating/Cooling Black Market Unified Threat Management IBM Finance Hard Disk Drives WiFi VoIP Managed IT Service Cookies Shadow IT Address Safety Remote Worker Software Tips Cache Disaster Resistance Bookmarks Social Networking Wireless Internet Computer Repair Holidays Crowdsourcing Technology Tips Hacker Fleet Tracking Tech Terms Features Wasting Time Cybercrime Mirgation High-Speed Internet Windows Server 2008 Notifications Multi-Factor Security Budget Human Error Permissions Star Wars Active Directory Laptop Superfish Botnet Network Congestion Staff Physical Security Servers User Error Authentication GPS YouTube Break Fix Nanotechnology Sports Outsourcing ROI Hotspot Value of Managed Services Business Growth Proactive IT Favorites Teamwork Information Technology Black Friday Motherboard Employer/Employee Relationships IT Mouse Asset Tracking Theft Google Maps Humor Database Travel End of Support Migration Development Hacking Google Calendar MSP Permission Supercomputer Cortana Fraud Windows Server Remote Working Content Filtering History Education Operations Managing Stress Telephone Printer Authorization Tracking Screen Reader Bitcoin Video Conferencing Telephony Notes Language eWaste Touchscreen IT Consulting Automobile Conferencing Shared resources Corporate Profile Cyber Monday Mobile Computing Proactive Maintenance Business Telephone Comparison OneNote Financial Office Tips Domains Motion Sickness Relocation Hiring/Firing Emergency Public Speaking Fun Presentation Staffing Lithium-ion battery Sync Error Printers IT Consultant CrashOverride Hard Drives Mobile Device Managment Public Cloud Students Marketing Administrator Regulation Competition IP Address Hacks Cleaning