Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Tip of the Week: Simple Practices to Secure Your Wi-Fi

Tip of the Week: Simple Practices to Secure Your Wi-Fi

Wi-Fi has swiftly become one of those amenities that we just expect to have, including in the workplace. While it does make work around the office more convenient, it should not be at the cost of your security. To help prevent this, we’re reviewing a few key Wi-Fi security considerations to keep in mind.

Don’t Rely On It For Your Security

Regardless of how secure your network purports to be, it doesn’t hurt to continue subscribing to best practices when it comes to maintaining your security -- in fact, it could very well hurt you not to do so. Wi-Fi in particular isn’t the most secure method to use out of the box, so you should always be sure to support what you use with additional protections and security measures. For example, you should always incorporate encryption to help protect your traffic, something that you need to make sure is done, because your traffic won’t be secure otherwise.

You should also follow general browsing best practices at all times, just as an added precaution. Avoid websites that lack the ‘s’ in https, as that ‘s’ stands for secure.

Protect Your Wi-Fi With Good Passphrases and Practices

At this point, most people are at least aware of what makes a bad password: the usual suspects, including:

  • Simple and common words and letter combinations being used
  • No variation in character type
  • Reusing the same password for different sets of credentials
  • Passwords written down on scrap paper or sticky notes

This is just a small sample of all the little habits and shortcuts that users will understandably start to pick up to make sure that they can remember all of the different passwords they need to maintain (not to mention the idea that they should use a different password for each account).

While your employees certainly shouldn’t be shortchanging your security measures, they are only human. One way to compromise with them (without compromising your security) is to use passphrases instead of passwords, creating a very bland sentence and using that as your authentication proof instead - something like “ipourthemilkintothecereal.” Memorable, yes, but certainly not well-known. Naturally, these should be kept confidential, and it will probably help to use a password manager to keep track of them. On top of that, add numbers, symbols, and capitalization.

Consider Your Wi-Fi Network

There are many ways that you can help increase the safety of your wireless network. Here are some quick highlights:

  • Change your SSID away from the factory default to a unique but unrevealing alternative, even if you keep your network hidden.
  • If a device has Wi-Fi capabilities that you are not actively using, make sure that the device is off to help truncate the amount of access points you have into your wireless network. If a device can be connected to your network via ethernet, consider doing so.
  • Keep business use of the network separate from any guest use of the network with a dedicated guest network, protected by a simple passphrase that you update periodically. Turn off the guest network whenever it is not needed for added security.

Want extra help with any of these security considerations? Trust the experts at 415 IT! We can help keep your technology safe for you to continue your business operations with it in your corner. Call (415) 295-4898 to learn more.

Defining Shadow IT and Its Risks
Is HealthCare IT Improving? In a Word: Absolutely


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 29 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Data IT Support Network Security Privacy Hosted Solutions Cloud Data Recovery Software IT Services Email Malware Business Outsourced IT Internet Managed IT Services Tech Term Efficiency Innovation Upgrade Computer Cloud Computing Windows 10 User Tips Microsoft Phishing Small Business Hackers Business Management Collaboration Mobile Devices Cybersecurity Hardware Google Business Continuity Ransomware Workplace Tips Backup Paperless Office Android Communication Managed Service VoIp Communications Server Office 365 Managed Service Provider Smartphones Encryption Remote Monitoring Data Management Managed IT Quick Tips Healthcare BDR Internet of Things Passwords Artificial Intelligence Business Technology Holiday Vulnerability Wi-Fi Saving Money Facebook Browser Applications Compliance Network Mobile Device Managed IT services Smartphone Miscellaneous Laptops Disaster Recovery Help Desk Government Save Money Document Management Windows 7 Automation Social Media Microsoft Office Virtualization Blockchain Processor Tip of the week Project Management Employer-Employee Relationship Information Vendor Management Redundancy Scam Avoiding Downtime Bandwidth Antivirus OneDrive Access Control Website BYOD Windows Data Security Infrastructure IoT Software as a Service RMM Data Loss Two-factor Authentication Chrome Maintenance Router IT Management Analytics VPN Customer Relationship Management Users Machine Learning Consultation Search Professional Services Training Mobile Security Electronic Health Records Unified Communications Employees Consulting Downtime Files Social Network Recycling Employee-Employer Relationship Virtual Private Network Company Culture Gmail The Internet of Things Managed Services Provider Risk Management Cooperation Password Apps Word Unified Threat Management Remote Workers Regulations Net Neutrality Patch Management Mobility Co-Managed IT Management File Sharing Hard Drive Tablet File Management Dark Web Augmented Reality Internet Exlporer Server Management Alert Proactive Smart Technology Payment Cards Gadgets Meetings Storage Monitoring Bring Your Own Device Assessment HIPAA Utility Computing Financial Remote Monitoring and Management Operating System Networking Network Management Managed Services G Suite Data Warehousing Flexibility Office Private Cloud Tech Support Technology Tips IT Assessment How To SaaS Test Unified Threat Management Procurement Database Management Smart Tech Legislation Credit Cards WPA3 Shortcut Proactive IT Shared resources Going Green Mobile Distributed Denial of Service Touchscreen Hacking 5G Mobile VoIP Development Instant Messaging Settings Personal Information Specifications Manufacturing Vendor Motherboard Chromebook Operations Bookmarks ROI Lenovo Virtual Assistant Bitcoin IT Technicians Cost Management Digital Payment Hotspot Digitize Time Management Managed IT Service Cyberattacks Social Samsung GDPR Connectivity Computers Fleet Tracking Heating/Cooling Zero-Day Threat IT Consulting Batteries Trending Mobile Device Management SharePoint Wireless Internet Big Data Cookies Cables Windows Server 2008 Customer Service Transportation Active Directory Migration eWaste Black Friday Mail Merge User Error Smart Devices Vulnerabilities Money Favorites Superfish Wasting Time Current Events Mouse Language Shadow IT Statistics Wireless Managing Stress Break Fix Read Only Security Cameras Holidays Asset Tracking Servers Backup and Disaster Recovery Data Breach CIO applications Remote Work Point of Sale Tech Terms Downloads Employer/Employee Relationships Apple Nanotechnology Wires Permissions MSP Finance Windows Server Chatbots Cyber Monday Staff Address WiFi Hard Disk Drives Sensors Mobile Computing Microsoft Excel Recovery Conferencing Database Mirgation Computing Infrastructure Outsourcing Bluetooth Spam Enterprise Content Management Printing Notes Wearable Technology Star Wars IT Human Error E-Commerce Theft Proactive Maintenance Solid State Drive App Google Calendar Fraud Optimization Authentication Techology User Management Identity Theft Enterprise Resource Planning Solid State Drives Geography Voice over Internet Protocol Projects Cache Computing Alerts Video Conferencing Electronic Medical Records Value of Managed Services Social Networking Virtual Reality Remote Worker PowerPoint Display Travel Business Telephone OneNote Websites Permission Technology Laws Features Emergency Multi-Factor Security Cybercrime Cyber security Screen Reader Virtual Machines Authorization Outlook Disaster Resistance Teamwork Information Technology Identity Firewall Printer Options Telephone Modem High-Speed Internet Politics Return on Investment Remote Computing Comparison Licensing Regulation Twitter Education Printers CEO Marketing Students Daniel Stevens

Latest Blog

It wasn’t too long ago when the idea of video conferencing was a very complicated one. The technology just wasn’t there to make it a major benefit for companies. As conferencing technology has been innovated upon, however, it now presents a laundry list of substantial benefi...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...