Wireless Network Security
Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.
But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. As WLANs send information over radio waves, someone with a receiver in your area could be picking up the transmission, thus gaining access to your computer.
They could load viruses on to your laptop which could be transferred to the company's network when you go back to work.
Up to 75 per cent of WLAN users do not have standard security features installed, while 20 per cent are left completely open as default configurations are not secured, but made for the users to have their network up and running ASAP.
It is recommended that wireless router/access point setup be always done though a wired client.
Change default administrative password on wireless router/access point to a secured password.
Enable at least 128-bit WEP encryption on both card and access point. Change your WEP keys periodically. If equipment does not support at least 128-bit WEP encryption, consider replacing it.
Although there are security issues with WEP, it represents minimum level of security, and it should be enabled.
Change the default SSID on your router/access point to a hard to guess name. Setup your computer device to connect to this SSID by default.
Setup router/access point not to broadcast the SSID. The same SSID needs to be setup on the client side manually. This feature may not be available on all equipment.
Block anonymous Internet requests or pings.
On each computer having wireless network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.
Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses should be registered with the router /access point.
Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.
You can test your hardware and personal firewalls using Shields Up test available at http://www.grc.com
All computers should have a properly configured personal firewall in addition to a hardware firewall.
Update router/access point firmware when new versions become available.
Locate router/access point away from strangers so they cannot reset the router/access point to default settings.
Locate router/access point in the middle of the building rather than near windows to limit signal coverage outside the building.
While none of the measure suggested above provides full protection as counter measures exist, a collection of suggested measures will act as a deterrent against attacker when other insecure networks represent easier targets.
The author of this article ia a software developer, consultant and author of numerous books. Visit his site for more information about the Top Spyware Removal Software.
Seven Nations Meet to Address Space Security > U.S. Department of Defense > Release - Department of Defense
Seven Nations Meet to Address Space Security > U.S. Department of Defense > Release Department of Defense
3 Ways Attackers Bypass Cloud Security DARKReading
Reports: Many security lapses led to Texas inmate's escape The Seattle Times
Chairman Thompson Lauds Homeland Security Provisions in NDAA, Including Measures to Protect Houses of Worship, Bolster Nation's Cybersecurity - House Homeland Security Committee
Chairman Thompson Lauds Homeland Security Provisions in NDAA, Including Measures to Protect Houses of Worship, Bolster Nation's Cybersecurity House Homeland Security Committee
Interpres Security Emerges from Stealth to Help Companies to Optimize Security Performance - DARKReading
Interpres Security Emerges from Stealth to Help Companies to Optimize Security Performance DARKReading
U.S. and Morocco Co-Host Proliferation Security Initiative Workshop - United States Department of State - Department of State
U.S. and Morocco Co-Host Proliferation Security Initiative Workshop - United States Department of State Department of State
Rep. Sherrill Secures Inclusion of Daniel Anderl Judicial Security and Privacy Act in the Final Version of the NDAA - Mikie Sherrill
Rep. Sherrill Secures Inclusion of Daniel Anderl Judicial Security and Privacy Act in the Final Version of the NDAA Mikie Sherrill
National Security Space: Overview of Contracts for Commercial Satellite Imagery - Government Accountability Office
National Security Space: Overview of Contracts for Commercial Satellite Imagery Government Accountability Office
OPSWAT MetaDefender Cloud Email Security protects users against zero-day threats - Help Net Security
The limitations of security organization benchmarking SecurityInfoWatch
The Week in Security: Software supply chain attack mines diamond industry, npm security boosted - Security Boulevard
The Week in Security: Software supply chain attack mines diamond industry, npm security boosted Security Boulevard
Top security news of 2022 Security Magazine
US-UK Energy Security and Affordability Partnership The White House
DHS Announces Extension of REAL ID Full Enforcement Deadline Homeland Security
Ex-FBI agent calls for more security at electric substations NewsNation Now
SpaceX begins partner project designed for national security GPS World magazine
IAEA Mission to Sudan Finds Improved Nuclear Security Infrastructure, Encourages Strengthening of Nuclear Security Detection and Response | IAEA - International Atomic Energy Agency
IAEA Mission to Sudan Finds Improved Nuclear Security Infrastructure, Encourages Strengthening of Nuclear Security Detection and Response | IAEA International Atomic Energy Agency
Haney's bill would keep landlords from charging costly security deposits CBS San Francisco
Investigation finds Etna trustee logged into security camera system more than 100 times in a month - The Newark Advocate
Investigation finds Etna trustee logged into security camera system more than 100 times in a month The Newark Advocate
Japan-U.S. Energy Security Dialogue Joint Statement US Embassy and Consulates in Japan
Will the U.S.-Africa Summit Address U.N. Security Council Reform? - United States Institute of Peace
Will the U.S.-Africa Summit Address U.N. Security Council Reform? United States Institute of Peace
Under the Surface: How Microsoft Is Digging Deep into Security BizTech Magazine
Beyond Identity and Zscaler join forces to strengthen zero trust security strategies - Help Net Security
Beyond Identity and Zscaler join forces to strengthen zero trust security strategies Help Net Security
‘We wanted it to be very overt:’ Columbia Police installs 50+ security cameras throughout the city - WIS News 10
‘We wanted it to be very overt:’ Columbia Police installs 50+ security cameras throughout the city WIS News 10
Remarks by National Security Advisor Jake Sullivan at the International Anti-Corruption Conference (IACC) - The White House
Remarks by National Security Advisor Jake Sullivan at the International Anti-Corruption Conference (IACC) The White House
Department of Homeland Security Updates School Swatting Incidents - West Virginia Public Broadcasting
Department of Homeland Security Updates School Swatting Incidents West Virginia Public Broadcasting
Ex-Trump advisor Flynn testifies amid heightened security The Atlanta Journal Constitution
Apple changes AirDrop security for all with iOS 16.2 after backlash over restrictions in China - TechCrunch
Apple changes AirDrop security for all with iOS 16.2 after backlash over restrictions in China TechCrunch
Mobile Security Vendor Approov Hires New CEO to Expand in US BankInfoSecurity.com
'We are taking this very seriously': Downtown patrols and security increased after armed robberies Wednesday - The Spokesman Review
'We are taking this very seriously': Downtown patrols and security increased after armed robberies Wednesday The Spokesman Review
Joe Kelly '83 to retire as Minnesota's director of Homeland Security and Emergency Management - CSB/SJU
Joe Kelly '83 to retire as Minnesota's director of Homeland Security and Emergency Management CSB/SJU
Android December 2022 security updates fix 81 vulnerabilities BleepingComputer
Man shot by security guard, arrested after trespassing at Palmetto Bay car dealership - WPLG Local 10
New Login Security Features for Multi-Factor Authentication App University of Arkansas Newswire
Chicago private school defends LGBTQ sex ed, tightens security after right-wing viral video - Chicago Sun-Times
Chicago private school defends LGBTQ sex ed, tightens security after right-wing viral video Chicago Sun-Times
Alleged killing of Texas girl by FedEx driver raises security concerns about shipping service - Fox News
Alleged killing of Texas girl by FedEx driver raises security concerns about shipping service Fox News
Security Council Press Statement on Sudan | UN Press United Nations
Chick-fil-A opening this month at Security Square Mall wmar2news.com
Energy Security Support to Ukraine - United States Department of State Department of State
National Security Memorandum on Strengthening the Security and Resilience of United States Food and Agriculture - The White House
National Security Memorandum on Strengthening the Security and Resilience of United States Food and Agriculture The White House
Palestinian President Threatens Return to Terrorism Washington Free Beacon
Analysis | Security in the digital economy is still in sight The Washington Post
TSA is adding face recognition at big airports. Here’s how to opt out. The Washington Post
‘Endangering Our National Security’: Senator Launches Inquiry Into Biden’s $200M Grant to China-Based Battery Company - Washington Free Beacon
‘Endangering Our National Security’: Senator Launches Inquiry Into Biden’s $200M Grant to China-Based Battery Company Washington Free Beacon
FBI director raises national security concerns about TikTok The Associated Press
Seoul arrests ex-top security official over border killing The Associated Press - en Español
Iran Holds First Execution Over Anti-Regime Protests Washington Free Beacon
Identity Theft Offline -- So Many Possibilities
Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.This survey wasn't a scam; in fact, it was an experiment.
Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge
Is your enterprise following the rules?The bulk of financial information in many companies is created, stored and transmitted electronically, maintained by IT and controlled via information integrity procedures and practices. For these reasons, compliance with federal requirements such as the Sarbanes-Oxley Act (SOX) is heavily dependent on IT.
How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer
If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage.
Dont Get Hacked - A Guide to Protecting Your Business from Thieves
You've seen it in the news - 40 million credit cards exposed!With all the news about web sites being hacked and cyberthieves stealing credit card numbers and other personal data,it's no wonder that some shoppers are still hesitant to providepayment information online. You don't have to be.
New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue
In 1997, I decided after 15 years as a practicing CPA that it was time to put down my pencil and explore a new venture on the exciting new internet which, while perhaps not exactly in its infancy at that point, was still at least a pimply faced teenaged medium still unexplored by most accountants.I founded CPAsites.
Click Here To Defeat Evil
Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it.
Dont Miss Information Because of Misinformation
It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other medium on the planet.
Dialing Up a Scam: Avoiding the Auto-Dialer Virus
For many, the daily walk to the mailbox evokes mixed feelings: The glee that your favorite monthly magazine - or a friend's hand-written letter (quite a surprise in the e-mail age) may be waiting is countered by anxiety of how many bills the postman left you.Now, imagine coming across your phone bill, thicker and heavier than normal.
Website Security - Creating a Bulletproof Site in 5 Easy Steps
When it comes to a secure website and passwords it is all in your hands to create a password that a hacker simply cannot crack. However, this will require that you be creative and use everything at your fingertips to create the strongest password possible for a secure web site.
Phishing: An Interesting Twist On A Common Scam
After Two Security Assessments I Must Be Secure, Right?---------------------------------------Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests.
Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.
Criminals are Fishing For Your Identity
What is Phishing? In a typical Phishing attack, a criminal will send you an email which appears to be from a well known company, bank or government agency. The email will direct you to click on a link which directs you to a Website or pop-up box that looks like the company's or organization's legitimate site.
Be Aware of Phishing Scams!
If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U.
Is the Internet Insecure Because of You?
Long gone are the days that we could feel secure and know for certain that we had privacy. With the digital age upon us we can no longer be so sure that our privacy is secure.
Detect Spyware Online
You can detect spyware online using free spyware cleaners and by installing spyware protection software on your computer. Often it's best to start with free spyware cleaners because these free programs will remove any spyware programs currently running on your computer.
Spyware, What It Is, What It Does, And How To Stop It
Spyware is software that runs on a personal computer without the knowledge or consent of the owner of that computer. The Spyware then collects personal information about the user or users of the infected computer.
Internet Small Business and Fraud
Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions.
Watch Out For That Scam
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint submissions for 2004, an increase of 66.6% from 2003.
How to Prevent Online Identity Theft
Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.Identity theft involves criminals stealing your personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out your bank accounts.
Can I Guess Your Password?
We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache.
|home | site map|