312-253-4321    Get SUPPORT

Alchetec Blog

Tip of the Week: Simple Practices to Secure Your Wi-Fi

Tip of the Week: Simple Practices to Secure Your Wi-Fi

Wi-Fi has swiftly become one of those amenities that we just expect to have, including in the workplace. While it does make work around the office more convenient, it should not be at the cost of your security. To help prevent this, we’re reviewing a few key Wi-Fi security considerations to keep in mind.

Don’t Rely On It For Your Security

Regardless of how secure your network purports to be, it doesn’t hurt to continue subscribing to best practices when it comes to maintaining your security -- in fact, it could very well hurt you not to do so. Wi-Fi in particular isn’t the most secure method to use out of the box, so you should always be sure to support what you use with additional protections and security measures. For example, you should always incorporate encryption to help protect your traffic, something that you need to make sure is done, because your traffic won’t be secure otherwise.

You should also follow general browsing best practices at all times, just as an added precaution. Avoid websites that lack the ‘s’ in https, as that ‘s’ stands for secure.

Protect Your Wi-Fi With Good Passphrases and Practices

At this point, most people are at least aware of what makes a bad password: the usual suspects, including:

  • Simple and common words and letter combinations being used
  • No variation in character type
  • Reusing the same password for different sets of credentials
  • Passwords written down on scrap paper or sticky notes

This is just a small sample of all the little habits and shortcuts that users will understandably start to pick up to make sure that they can remember all of the different passwords they need to maintain (not to mention the idea that they should use a different password for each account).

While your employees certainly shouldn’t be shortchanging your security measures, they are only human. One way to compromise with them (without compromising your security) is to use passphrases instead of passwords, creating a very bland sentence and using that as your authentication proof instead - something like “ipourthemilkintothecereal.” Memorable, yes, but certainly not well-known. Naturally, these should be kept confidential, and it will probably help to use a password manager to keep track of them. On top of that, add numbers, symbols, and capitalization.

Consider Your Wi-Fi Network

There are many ways that you can help increase the safety of your wireless network. Here are some quick highlights:

  • Change your SSID away from the factory default to a unique but unrevealing alternative, even if you keep your network hidden.
  • If a device has Wi-Fi capabilities that you are not actively using, make sure that the device is off to help truncate the amount of access points you have into your wireless network. If a device can be connected to your network via ethernet, consider doing so.
  • Keep business use of the network separate from any guest use of the network with a dedicated guest network, protected by a simple passphrase that you update periodically. Turn off the guest network whenever it is not needed for added security.

Want extra help with any of these security considerations? Trust the experts at Alchetec! We can help keep your technology safe for you to continue your business operations with it in your corner. Call 312-253-4321 to learn more.

Defining Shadow IT and Its Risks
Is HealthCare IT Improving? In a Word: Absolutely
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, April 09 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Productivity Business Computing Cloud Network Security Data Data Backup IT Services Privacy Hosted Solutions Malware Software IT Support Email Hackers Internet Outsourced IT Microsoft Innovation Data Recovery Computer Business Efficiency Hardware Business Continuity Cloud Computing Productivity Managed IT Services Backup User Tips Upgrade Tech Term Ransomware Mobile Devices Google Collaboration Phishing Small Business Cybersecurity Managed IT Services Windows 10 Business Management Workplace Tips Communication VoIP IT Support Paperless Office Smartphones Android Office 365 Remote Monitoring Managed Service Disaster Recovery Data Management Mobile Device Communications Server Internet of Things Managed Service Provider Managed IT Smartphone Facebook Quick Tips Network Save Money Passwords Encryption Help Desk Holiday Miscellaneous Social Media Virtualization Wi-Fi Artificial Intelligence Browser BDR Healthcare BYOD Saving Money Windows 7 Compliance Government Windows 10 Document Management Business Technology Employer-Employee Relationship Risk Management Laptops Vendor Management Windows Applications Training Automation Microsoft Office Password Mobility Storage Antivirus Recovery Redundancy Vulnerability Maintenance Processor IT Management Scam Analytics Project Management Going Green Chrome Blockchain Information Infrastructure SaaS Data loss Tip of the week Avoiding Downtime Telephone Systems Apps Bandwidth Unified Threat Management File Sharing Office Files Big Data Users Gmail Website Meetings OneDrive Money Router App RMM Word Politics VPN Wireless Machine Learning Mobile Device Management IoT Access Control Virtual Reality Virtual Private Network IT Service Two-factor Authentication Regulations Work/Life Balance Data Storage Data Security Firewall Company Culture Software as a Service Computing Tablet Bring Your Own Device Gadgets Hosted Solution Customer Relationship Management Computers Robot How To Proactive Consultation Samsung Unified Communications Uninterrupted Power Supply Employees Managed Services Provider Customer Service Smart Technology Employee-Employer Relationship Network Management Social Network Management Display Chromebook How To Remote Monitoring and Management Net Neutrality HIPAA Settings Twitter File Management Professional Services Server Management Remote Workers Health Monitors Operating System Networking Social Payment Cards Internet Exlporer Hard Drive Solid State Drive Search Remote Computing Downtime Electronic Medical Records Co-Managed IT Cooperation Digital Payment Mobile Security Identity Theft Managed Services Flexibility Augmented Reality Licensing Monitoring Printing Recycling Assessment Alert Utility Computing Electronic Health Records The Internet of Things Dark Web Outlook Consulting Patch Management Apple Upgrades Time Management GDPR Digitize Chatbots Cables Test Superfish Smart Devices Cybercrime Cyberattacks Voice over Internet Protocol Multi-Factor Security Enterprise Content Management GPS YouTube Black Market Remote Work Data Warehousing Smart Tech Unsupported Software PowerPoint Servers User Error Options Credit Cards Wearable Technology Mouse Return on Investment Google Maps 3D Printing Procurement Proactive IT Computer Repair Crowdsourcing Computing Infrastructure Information Technology Botnet Shadow IT Identity Supercomputer Notifications Sensors Cost Management Travel Dark Data Read Only Hacking Google Calendar Vulnerabilities Tracking Social Engineering Wires Zero-Day Threat Physical Security Microsoft Excel Connectivity Content Filtering History Mobile Data Point of Sale Printer Sports Wireless Internet Holidays Instant Messaging Manufacturing Comparison Business Growth Active Directory Spam Distributed Denial of Service Modem Security Cameras Touchscreen IT Consulting Windows Server 2008 Alerts Enterprise Resource Planning Corporate Profile Legislation Outsourcing IT Budget WPA3 Transportation Trending IT Technicians Geography Digital Backup and Disaster Recovery Value of Managed Services G Suite Cabling E-Commerce Virtual Assistant Websites Employer/Employee Relationships Telephony IT Finance Hard Disk Drives Specifications Windows Server Automobile Managed IT Service Cookies Remote Worker Data Breach Mobile Computer Care WannaCry Emoji Bitcoin Video Conferencing Social Networking Fleet Tracking Tech Terms Google Drive Telephone Cache Taxes Hard Disk Drive Network Congestion Bookmarks Mirgation High-Speed Internet Spyware Human Error Firefox IT Solutions Processors Permissions Star Wars Humor Features Wasting Time Statistics SharePoint Proactive Maintenance Business Telephone End of Support Authentication Mail Merge USB User Management Tech Support Break Fix Nanotechnology Cortana ROI Technology Laws Legal Law Enforcement Optimization Wireless Technology 5G Staff Teamwork Shortcut Current Events Private Cloud Biometric IBM Black Friday Motherboard Asset Tracking Theft Techology Personal Information Mobile VoIP Safety Hotspot Education Favorites Migration Development MSP Permission Lenovo Vendor Hacker Fraud Disaster Office Tips Database Bluetooth Downloads Update Database Management IT Assessment WiFi VoIP Authorization Address Batteries Screen Reader Software Tips Notes Heating/Cooling Unified Threat Management Solid State Drives Gadget Virtual Machines Operations Managing Stress Conferencing Shared resources Technology Tips Projects Gamification Cyber Monday Mobile Computing OneNote Financial Disaster Resistance Virus Cyber security Language eWaste IP Address Fun Public Cloud Outsource IT Mobile Office Domains Laptop Cleaning Hard Drives Hacks Motion Sickness Printers Emergency Public Speaking Presentation Relocation Lithium-ion battery Students Regulation Sync Staffing IT Consultant CrashOverride Marketing Budget Mobile Device Managment Error Administrator Hiring/Firing Competition