Wireless Security Guide

Wireless Security Guide

Wireless broadband connectivity has radically changed the way we access information and shop online, enabling multiple users on different types of device to use the same connection. However, there are always those looking to exploit the latest technology, meaning wireless security has to defend your connection against a number of threats.

  • Accidental association: When two networks are in over-lapping range, it’s not uncommon for people to access your connection by mistake.
  • Malicious association: Hackers may intentionally attempt to connect to your network.
  • Identity theft: One of the most serious threats, hackers can access the MAC to obtain network privileges.
  • Denial of service: When hackers bombard a specific access point, you may be unable to access the internet yourself or may experience a system crash.
  • Man-in-the-middle: Internet hotspots are particularly vulnerable to hackers monitoring internet traffic.
  • Network injection: By injecting false commands into the network, hackers can trigger an entire network to collapse.
Securing your connection

With a host of threats potentially compromising your network, it’s essential that you take the necessary steps to ensure its security.

  • Always change the name and default password provided by the manufacturer
  • Select a router name that is unique and not the same as your password
  • Disconnect your router when connection isn’t required
  • Avoid storing personal information on your computer
  • Close all the ports on your router and disable ping responses
  • Create a DZM – a firewall between the LAN and wireless network
  • Ensure your router has a Wired Equivalent Privacy (WEP) or a WiFi Protected Access (WPA) key

WPA only works with compatible routers, adaptors and software, and offers a number of enhanced versions

  • 802.1X
  • LEAP – Lightweight Extensible Authentication Protocol
  • PEAP – Protected Extensible Authentication
  • TKIP – Temporal Key Integrity Protocol
  • RADIUS – Remote Authentication Integrity Protocol
  • WAPI – WLAN Authentication and Privacy Infrastructure
Your internet use

It is worth noting that, if you are using a wireless network just at home, enabling a WEP will prove effective.

Additional security information

Wireless security is a highly technical area that is constantly evolving. By following the advice above, you should be able to ensure that your internet connection is being used by authorised users only. For more information on how to enhance the level of security on your wireless network, contact the customer representatives at Xinix today. They will be happy to answer any questions you may have and help provide the perfect solution.

Video
Video
Video

Need more help?

Please contact us in any convenient way, and we will help you.

0800 5200 300

Speak to an expert
Call us for free

[email protected]

99% Of issues resolved in less than a hour

Chat

Friendly, efficient chat operators are always on standby