Title: Protect Your Wireless Network - and Your Business: You Don't Have to Be a Systems Expert to Better Defend Yourself against Hackers
Abstract: [ILLUSTRATION OMITTED] It's hard to stop hackers from gaining access to something as ethereal as an electronic signal. That s why it has always been challenging to secure a wireless network. If yours isn't secure, your business and its data are at great risk. Hackers may be able to monitor which sites you visit, or see the information you exchange with business partners. They also may be able to log on to your network and access your files. Although wireless networks have been susceptible to intrusion, their security has improved greatly. Read on to see how you can make yours safer. 1. INSTALL A SECURE WIRELESS ROUTER This device connects the PCs on your network to the Internet. Note that all routers are not created equal. At a minimum, you need a router that (1) supports the least decipherable encryption, (2) conceals its identity from unauthorized, inquisitive parties outside your network, and (3) prevents anyone from entering your network via an unauthorized computer. The examples below refer to a router manufactured by Belkin International. It, and similar routers made by other companies, are widely used in today's networks; their setup procedures are very similar. The recommendations in this article apply to such devices. Note that older or less expensive routers might not offer the same functionality as the one in these examples. 2. CHOOSE A SAFE ROUTER NAME Do this by using the manufacturer's configuration software. The router's name will be visible as a broadcast point (also known as a hotspot) to you or anyone else trying to connect to a wireless network in the router's broadcast area. Do not name your router after its brand name or model (for example, Belkin, Linksys or AppleTalk). That would identify it specifically enough for hackers to look up its potential security flaws. Likewise, naming your muter after yourself, your address, business name or favorite team, etc., could help hackers guess your network password. Exhibits 1, 3 and 4 illustrate typical--in this case, Belkin--setup software for routers. See Exhibit 1, in which the router is assigned the name 7GHJPO9. You can make your router name secure by composing it entirely of such random letters and numbers or any other string of characters that reveal neither your router model nor your identity. 3. CUSTOMIZE YOUR PASSWORD Change the router's factory-set default password. If you reveal to hackers what model router you have, they will know its default password. And if the setup software offers you the option of permitting remote administration, disable that feature so that no one can control the settings via the Interact. 4. HIDE YOUR ROUTER NAME After choosing a secure name, hide the broadcast of its name, also known as its SSID (service set identifier). Exhibit 1 shows how to hide the SSID by not checking the Broadcast SSID box. Once you've done this, your router will not appear on the broadcast list of routers in your area, and your wireless network will be invisible to neighbors and hackers. You still will be broadcasting, but hackers will need sophisticated equipment to determine whether you have a wireless network. 5. LIMIT ACCESS TO YOUR NETWORK You should prevent unauthorized computers from connecting to your wireless net work using a method known as MAC address filtering (which has nothing to do with Apple Inc.'s Mac computers). To do this, you first must find out the MAC (Media Access Control) address of every PC you will let connect to your network. All computers are identified by a 12-character MAC address. To see your PC's, click Start, then Run, enter cmd and click on OK. This will open a new window with a DOS prompt. [ILLUSTRATIONS OMITTED] Type ipconfig/all and hit the Enter key to see information about your PC's network interface card. Under Physical Address, your PC's MAC address will be displayed. …
Publication Year: 2008
Publication Date: 2008-11-01
Language: en
Type: article
Access and Citation
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot