Enhance the security of your wireless connections by following a few simple steps. These suggestions should reduce the likelihood of security breaches, but do not guarantee total wireless security. Guard your information carefully, and know what to do in the event that your wireless network is hacked.
- Be sure to review your wireless equipment instruction manuals and help guides for other recommended security-related instructions.
- Change your Service Set Identifier (SSID), the default “address” that identifies your wireless connection. Hackers know the most common SSIDs default settings and changing your SSID can thwart their efforts.
- Check your SSID features and disable SSID Broadcast. SSID Broadcast allows others to find your wireless connection and gain unauthorized access to your network.
- Consult with your wireless provider to control your wireless Access Point Coverage to potentially decrease the opportunity for others to infiltrate your network and gain access to your information. Radio signals used to broadcast your wireless network could be visible to criminals trying to infiltrate your network. Any wireless signal that is broadcast outside of the desired area could provide an opportunity for a hacker to access your network without entering the premises.
- Turn on the encryption feature if it is available to you. The signal from your wireless network is broadcast throughout your surrounding area. Encrypting data in transit allows only the intended recipient to access the information you are sending.
- Change your wireless default password on a regular basis. Many people use familiar passwords that hackers can easily identify. Utilize combinations of letters, numbers, and symbols when creating passwords. Frequent password changes may greatly reduce this type of system hacking.
- If your wireless network is tied to a MAC, enable MAC filtering to prevent or permit specific PCs from accessing your wireless network.
- Disable wireless File and Print Sharing features when not being utilized to limit unauthorized access, as these are potential access points through which a hacker could steal data or commandeer resources, if the hacker were able to bypass your encryption.