4 Tips to Secure Your Wireless Network


Tips & Resources Dec 10, 2015

Melinda Billingsley

Marketing Coordinator

Holiday season is well underway – cue the (sometimes excessive) online shopping.

Buying gifts and decorations for the holidays is just a few clicks away, and as long as your network is up and running, you’re good to go right? Shop away!

But if you’re not ensuring that your network is protected, unwanted users can access your Internet connection and slow down speeds, or worse, access your private information.

Basic network security is not difficult to achieve and is important for your WiFi network. Here are 4 simple steps to secure your wireless network:

  1. Change the SSID (Network Name)
    Don’t use the default SSID. The default network name usually reveals the manufacturer of the router you’re using, and that information could be used to gain access to your unit. Here are steps to change the SSID on a Buffalo AirStation router.
     
  2. Use the latest encryption protocol
    Make certain that you use the latest protocol available on your router. All of the newest routers are required to support WPA2/AES encryption. Do not use WEP, TKIP or mixed mode. If you need help to better understand encryption protocols, here’s an article from How-To Geek.
     
  3. Use a good password
    Go beyond the minimum 8 characters. The best password is a random sequence of characters. You can even use a random password generator. You may be thinking, “Great – another password to remember,” but in most cases it only has to be typed in once for each device, so you don’t have to re-enter it every time you use the WiFi.
     
  4. Disable WPS
    Almost all routers come with a WPS button to simplify connecting some devices. It’s also a weak point in the network and can be used to gain access. Turn it off and connect devices manually. It may take a little more effort, but it’s a simple way to keep your network safe.

 

And that’s all – securing your network is that easy! Keep your WiFi network more secure from intruders by implementing these simple steps.

Related Articles


X