Protecting your Wi-Fi network is essential for keeping your privacy protected, but how do you know your network protection is up to par?
Dave Johnson, eHow’s editorial director, has the help you need with clear do’s and don’ts for protecting your Wi-Fi network.
- Don’t hide your router’s ID or SSID. Hiding your network’s name simply makes it show up as an unnamed network. It doesn’t block anyone from seeing that the network exists. It may invite interest from hackers about what you’re hiding.
- Don’t use media access control (MAC) address filtering. A MAC address is the unique sequence of numbers and letters assigned to an individual electronic device such as a phone, laptop or tablet. By filtering the MAC addresses within your network settings, you limit access to your router to only the individual MAC sequences you’ve specifically granted access. Doing so seems solid, but it won’t stop hackers.
- Don’t shrink the Internet Protocol pool. If you limit the number of allowable IP addresses, hackers are still able determine which addresses are allowed and use that information to hack into your system.
- Do use encryption and strong passwords. Encryption—the best of which today is WPA2—is the process of encoding messages to prevent the original information from being recognizable. This makes it difficult for hackers to read your information and infiltrate your network. Boost your security with a strong password: no fewer than 12 characters, using numbers, uppercase and lowercase letters, and special characters.
— Adapted from “Wi-Fi security precautions that don’t work,” Dave Johnson, CBS MoneyWatch.
Like what you've read? ...Republish it and share great business tips!
Attention: Readers, Publishers, Editors, Bloggers, Media, Webmasters and more...
We believe great content should be read and passed around. After all, knowledge IS power. And good business can become great with the right information at their fingertips. If you'd like to share any of the insightful articles on BusinessManagementDaily.com, you may republish or syndicate it without charge.
The only thing we ask is that you keep the article exactly as it was written and formatted. You also need to include an attribution statement and link to the article.
" This information is proudly provided by Business Management Daily.com: http://www.businessmanagementdaily.com/37407/the-truth-about-protecting-your-wi-fi "