How to Protect Wireless Remote Connections

How to Protect Wireless Remote Connections

Any employee that is working remotely via wireless connection should not only employ the security solutions and procedures outlined in this month’s theme article, “Create a Secure Remote Working Environment,” but they should also take measures to secure the wireless connection itself. Here are some things remote employees should do to protect their wireless connections:

Enable Wi-Fi Protected Access (WPA).  WPA and WPA2 (the newest generation of WPA security) encrypt any wireless data that is transmitted, and prohibits eavesdropping. An older, less secure wireless encryption method is the Wired Equivalent Privacy (WEP). A strong password (at least eight characters, using both numbers and letters) should be used when this encryption is set up.

Change the network name. Routers and access points use a network name called the Service Set Identifier (SSID). Manufacturers typically name all the SSIDs the same, so the default network name should be changed when setting up the connection.

Close your network. Many Wi-Fi systems allow the user to close the network by blocking the SSID from being broadcast, making it more difficult for hackers to find.

Placement of the wireless access point. Wireless signals can travel up to 200-300 feet away from the access point. If they must pass through metal and wood, that distance decreases. To lessen the chances that the wireless signal will travel very far outside a house or building where it could be intercepted, the access point should be placed in the middle of the structure, away from doors and windows.

MSPs Empower Remote Work

Change the default login. When setting up an access point or router you will be able to enter your network address and account information. These tools are protected with a login that asks for a username and password. Usually the default logins are simple and very well-known to hackers, so they should be changed immediately. And of course they should be hard to guess.

Set up a MAC Access Control List. The access point should be set so that it only enables network access to trusted Media Access Control (MAC) addresses. Every network card has a unique MAC identifier, and this way rogue wireless connections can be filtered out by only letting trusted MAC addresses that are on the MAC List have access to the wireless network.

Turn off network when not in use. It may go without saying, but shutting down the wireless network when it’s not in use is one surefire way to help keep intruders out.

These are some relatively easy ways to enhance the security of a wireless connection. Following these practices and employing the proper antivirus, firewall, and VPN technologies will help create a secure connection as important data and information flows in and out of your small business’ four walls.

from symantec

SHARE:

Facebook
Twitter
LinkedIn

Video Resources

Are You It Resources Effective In The New Normal

VIDEO/WEBINAR

Are Your IT Resources Effective in the New Normal?

Align2020 A Virtual Conference

VIDEO/VIRTUAL CONFERENCE

Align 2020
Cyber Security, Compliance & Collaboration

Best Practices For Working In A Modern, Mobile, And Secure Environment

VIDEO/WEBINAR

Best Practices for Working in a Modern, Mobile, and Secure Environment

NEWSLETTER