Security For Computer Users
Help in Securing your Wireless Network
Like everything else that involves the internet, there is no absolute protection for wireless networks. Those with intent will try to break in so you need to layer your security measures for deterrence. If you secure the wireless end of your system, protect your computers and follow safe practices it's more likely intruders will move on to another, easier more vulnerable system.Change the SSID default setting and turn its broadcast off
- Service Set Identifier (SSID) identifies the network name
- Wireless network devices use it to tell wireless networks apart
- If a home user doesn't change the "out-of-the-box" setting, hackers who know that the network exists can systematically enter all the known default settings until they hit upon the right name
- When changing your SSID, don't use your address or your last name
- The SSID shouldn't identify who or where you are
Change the default password
- Use a strong password to protect your access point. (See the Safe practices section for more on passwords)
- A Media Access Control (MAC) address identifies each device attached to a wireless network. You can enable MAC address filtering to specify which computers have access to your network.
- Though some hackers may be able to get around this, it's another layer of protection.
- Use the highest level of encryption available to your network
- New models use Wi-Fi Protected Access (WPA)
- Older versions use Wired Equivalent Privacy (WEP)
- Considered flawed by many security consultants but it's still a form of encryption and again, another layer of security.
- Given that someone can drive another 50 feet and find another access point that's wide open, it's still a reasonable deterrent
You can secure your wireless network it just takes a little effort.
Protecting you Inbox
Next, we return to e-mail security
As always, should you have any questions about your computer, do not hesitate in picking up the phone or writing... better to contact me and be sure.
Tom @ Tata Computers