How to Protect Wireless Remote Connections

SHARE

How to Protect Wireless Remote Connections

Any employee that is working remotely via wireless connection should not only employ the security solutions and procedures outlined in this month’s theme article, “Create a Secure Remote Working Environment,” but they should also take measures to secure the wireless connection itself. Here are some things remote employees should do to protect their wireless connections:

Enable Wi-Fi Protected Access (WPA).  WPA and WPA2 (the newest generation of WPA security) encrypt any wireless data that is transmitted, and prohibits eavesdropping. An older, less secure wireless encryption method is the Wired Equivalent Privacy (WEP). A strong password (at least eight characters, using both numbers and letters) should be used when this encryption is set up.

Change the network name. Routers and access points use a network name called the Service Set Identifier (SSID). Manufacturers typically name all the SSIDs the same, so the default network name should be changed when setting up the connection.

Close your network. Many Wi-Fi systems allow the user to close the network by blocking the SSID from being broadcast, making it more difficult for hackers to find.

Placement of the wireless access point. Wireless signals can travel up to 200-300 feet away from the access point. If they must pass through metal and wood, that distance decreases. To lessen the chances that the wireless signal will travel very far outside a house or building where it could be intercepted, the access point should be placed in the middle of the structure, away from doors and windows.

MSPs Empower Remote Work

Change the default login. When setting up an access point or router you will be able to enter your network address and account information. These tools are protected with a login that asks for a username and password. Usually the default logins are simple and very well-known to hackers, so they should be changed immediately. And of course they should be hard to guess.

Set up a MAC Access Control List. The access point should be set so that it only enables network access to trusted Media Access Control (MAC) addresses. Every network card has a unique MAC identifier, and this way rogue wireless connections can be filtered out by only letting trusted MAC addresses that are on the MAC List have access to the wireless network.

Turn off network when not in use. It may go without saying, but shutting down the wireless network when it’s not in use is one surefire way to help keep intruders out.

These are some relatively easy ways to enhance the security of a wireless connection. Following these practices and employing the proper antivirus, firewall, and VPN technologies will help create a secure connection as important data and information flows in and out of your small business’ four walls.

from symantec

UPCOMING VIRTUAL EVENTS

Demystifying Cyber Security for SMBs

sb-cyber-security-master-class

The continually changing threat landscape requires us to update best practices and add new concepts to keep your organization safe.

SESSION 4: Cyber Security Strategy
Watch On-Demand

SESSION 5: Cyber Insurance & MFA
Watch On-Demand

SESSION 6: Threat Detection | JAN. 15

Microsoft Copilot
Master Class Workshop

sb-microsoft-copilot-master-class

eMazzanti will host 60-minute Master Classes, that speak to how AI can help your business streamline and grow.

In each session, you will have Artificial Intelligence and Automation explained, view a live demo of Copilot, and see it live in action in a dynamic format.

RESOURCES

Cyber Security Awareness Hub

sb-Cyber-Security-Awareness-Hub

Cyber Security Awareness Kit, designed to be delivered to your team in bitesize chunks.

We are sharing the resources and highlighting services your organization needs, covering everything from multifactor authentication to software updates, showing your users just how easy it is to improve their security posture.

Resource Library

sb-resource-library

Insights to help you do what you do better, faster and more profitably.

> Tips to Stay Protected Against Phishing Attacks

> Understanding Ransomware 

> The 6 Known Wi-Fi Threat Categories Targeting Your Business and How to Defend Against Them

> Practical Advice for Avoiding Phishing Emails

Recent Articles

NEWSLETTER

Categories