Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Tip of the Week: Simple Practices to Secure Your Wi-Fi

Tip of the Week: Simple Practices to Secure Your Wi-Fi

Wi-Fi has swiftly become one of those amenities that we just expect to have, including in the workplace. While it does make work around the office more convenient, it should not be at the cost of your security. To help prevent this, we’re reviewing a few key Wi-Fi security considerations to keep in mind.

Don’t Rely On It For Your Security

Regardless of how secure your network purports to be, it doesn’t hurt to continue subscribing to best practices when it comes to maintaining your security -- in fact, it could very well hurt you not to do so. Wi-Fi in particular isn’t the most secure method to use out of the box, so you should always be sure to support what you use with additional protections and security measures. For example, you should always incorporate encryption to help protect your traffic, something that you need to make sure is done, because your traffic won’t be secure otherwise.

You should also follow general browsing best practices at all times, just as an added precaution. Avoid websites that lack the ‘s’ in https, as that ‘s’ stands for secure.

Protect Your Wi-Fi With Good Passphrases and Practices

At this point, most people are at least aware of what makes a bad password: the usual suspects, including:

  • Simple and common words and letter combinations being used
  • No variation in character type
  • Reusing the same password for different sets of credentials
  • Passwords written down on scrap paper or sticky notes

This is just a small sample of all the little habits and shortcuts that users will understandably start to pick up to make sure that they can remember all of the different passwords they need to maintain (not to mention the idea that they should use a different password for each account).

While your employees certainly shouldn’t be shortchanging your security measures, they are only human. One way to compromise with them (without compromising your security) is to use passphrases instead of passwords, creating a very bland sentence and using that as your authentication proof instead - something like “ipourthemilkintothecereal.” Memorable, yes, but certainly not well-known. Naturally, these should be kept confidential, and it will probably help to use a password manager to keep track of them. On top of that, add numbers, symbols, and capitalization.

Consider Your Wi-Fi Network

There are many ways that you can help increase the safety of your wireless network. Here are some quick highlights:

  • Change your SSID away from the factory default to a unique but unrevealing alternative, even if you keep your network hidden.
  • If a device has Wi-Fi capabilities that you are not actively using, make sure that the device is off to help truncate the amount of access points you have into your wireless network. If a device can be connected to your network via ethernet, consider doing so.
  • Keep business use of the network separate from any guest use of the network with a dedicated guest network, protected by a simple passphrase that you update periodically. Turn off the guest network whenever it is not needed for added security.

Want extra help with any of these security considerations? Trust the experts at 415 IT! We can help keep your technology safe for you to continue your business operations with it in your corner. Call (415) 295-4898 to learn more.

Defining Shadow IT and Its Risks
Is HealthCare IT Improving? In a Word: Absolutely
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 07 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Backup Data IT Support Network Security Privacy Hosted Solutions Cloud IT Services Data Recovery Software Efficiency Business Internet Email Managed IT Services Outsourced IT Malware Innovation Tech Term Small Business Hackers Cloud Computing Upgrade Collaboration Computer Hardware Windows 10 Microsoft Cybersecurity User Tips Business Management Business Continuity Mobile Devices Phishing Google Communication Backup Mobile Device Workplace Tips Managed Service Provider VoIp Ransomware Managed Service Quick Tips Smartphones Android Paperless Office Office 365 Disaster Recovery Encryption Server Communications Smartphone Business Technology Remote Monitoring Browser Data Management Managed IT Saving Money Vulnerability Remote Work Healthcare Holiday Internet of Things Compliance Passwords Wi-Fi Windows 7 BDR Network Artificial Intelligence Save Money Social Media Facebook Miscellaneous Help Desk Laptops Managed IT services Document Management Government Microsoft Office Data Security Users Applications Blockchain Information Two-factor Authentication Processor Redundancy Employer-Employee Relationship Scam Health Tip of the week Bandwidth Vendor Management Automation Avoiding Downtime Project Management Virtualization Antivirus Storage Router RMM Infrastructure Data Loss Proactive Software as a Service Covid-19 Maintenance Machine Learning Meetings VPN Chrome Website Office Mobility Analytics Company Culture Access Control Employee-Employer Relationship Virtual Private Network IoT OneDrive Regulations Windows Training IT Management Hard Drive BYOD Customer Relationship Management Cooperation Social Network Consultation Risk Management HIPAA Utility Computing Password Bring Your Own Device Alert Net Neutrality Mobile Office Time Management Monitoring Remote Worker Tablet Financial Dark Web Augmented Reality File Management Remote Monitoring and Management Internet Exlporer Smart Technology Co-Managed IT Recycling Networking Unified Threat Management Operating System Search Payment Cards Computing Electronic Health Records Employees Files Information Technology Consulting Downtime Server Management Flexibility Managed Services Mobile Security Professional Services Managed Services Provider Management Gadgets Unified Communications Assessment Apps Word File Sharing Remote Workers Patch Management Data Breach Data Storage Gmail The Internet of Things Network Management Black Friday Address WiFi Transportation Active Directory Cache Conferencing Gamification Wireless Internet Big Data Geography SaaS Wasting Time Current Events Printing Money Digitize Smart Devices Social Networking Human Error Mouse Language Hacking E-Commerce Theft Break Fix Computers CIO applications Identity Authentication Techology Screen Reader Touchscreen Cyber Monday Staff Windows Server 2008 Windows Server Remote Computing Permissions Employer/Employee Relationships Apple Modem High-Speed Internet Electronic Medical Records Database Tech Support Microsoft Excel Shadow IT Hard Disk Drives Sensors G Suite Heating/Cooling OneNote Permission Computing Infrastructure Technology Laws Trending Features Emergency Multi-Factor Security Holidays Mobile Authorization Outlook Disaster Resistance Notes Smart Tech Printer User Management Politics Google Calendar Fraud Outsource IT Proactive Maintenance Solid State Drive Development Statistics Voice over Internet Protocol Projects IT Technicians Cost Management Private Cloud Outsourcing Solid State Drives Motherboard Chromebook Servers How To Test Alerts Unified Threat Management Connectivity Procurement Virtual Reality IT Value of Managed Services WPA3 Travel Shortcut Proactive IT Peripheral PowerPoint Display Firewall Optimization Teamwork Migration eWaste Recovery Instant Messaging Laptop Cybercrime Cyber security Cookies Cables Bluetooth Licensing Return on Investment Bookmarks ROI Lenovo Video Conferencing Options Telephone Vulnerabilities Comparison Cyberattacks Social Data Warehousing Samsung Business Telephone Managing Stress Fleet Tracking Zero-Day Threat Technology Tips IT Consulting PCI DSS Mobile Device Management Distributed Denial of Service SharePoint Virtual Machines Shared resources Going Green Chatbots Customer Service Legislation Remote Working Database Management Nanotechnology Wires Specifications Mail Merge User Error Settings Personal Information Mirgation Favorites Superfish Biometric 5G Mobile VoIP Mobile Computing Websites Wireless Bitcoin Wearable Technology Star Wars Read Only Security Cameras Operations IT Assessment Manufacturing Vendor Spam Enterprise Content Management Asset Tracking Backup and Disaster Recovery Digital Payment Hotspot Virtual Assistant Point of Sale Tech Terms Managed IT Service Downloads Credit Cards Batteries Identity Theft Enterprise Resource Planning MSP Finance Budget GDPR App Printers CRM Education CEO Students Daniel Stevens Regulation Twitter Marketing

Latest Blog

Your data is vital for your organization’s continuity. Your data consists of everything from your company documents, accounting records, client contact information, prospects and leads, procedures, and everything else needed for you to keep operations running smoothly. That’...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...