Wireless Network Security Guidelines

Secure Your Wireless Network: Essential Guidelines for Businesses

Not many businesses would install a computer outside their office building while connected to their internal network.

Apart from the cost it would mean anyone passing by could tap into their company files and potentially make off with valuable information. A daft thought of course, but that is exactly what is on offer to anyone in the neighbourhood if a wireless network is left unprotected.

The wireless signal can often be picked up dozens of metres outside the building. Stories abound of people sharing the neighbour’s internet connection over their wireless network.

Fortunately there are a number of ways to minimize the chance of unauthorised access to your network. If you have a wireless router or access point, but are only using the cabled network, then make sure the wireless function is switched off.

To minimise the possibility of unauthorised access, wireless networks require additional layers of security.

Service Set Identifiers (SSIDs – the name you give your network) should have a name that has no apparent connection with you, your business or your address, to avoid connection with you.

Encryption between the router and computers is advisable:

  • WEP – common in the past but very easy to crack – do not use
  • WPA2 – the better option but still not 100% “hacker safe”

MAC addresses associated with individual computers can be added to wireless router configurations so that only permitted computers can access the router;

Adding an administrative layer, such as a username and password ensures that only computers with those details can access the wireless network.

We generally recommend, where possible, the use of cabled networks for reliability and security. However, this is not always possible or convenient.

If you have any concerns over the security of your wireless network then get in touch with the team at Pronetic and we’ll help.

Request A FREE Call Back

Simply fill in the form below to receive your FREE call back with one of our expert team members.

By submitting this form, you consent to us using your personal information to contact you – for more information please see our privacy policy.

How To Banish IT & Cyber Security Headaches From Your Life:

1. Contact Pronetic

Contact us to schedule a call with Andy or Kate to see if working with Pronetic will be right for you.

2. Review & Strategy

We review your systems to identify risks and opportunities and give you a 12-month roadmap keeping you audit-ready while maximising staff productivity.

3. "Baked-In" Compliance

Enjoy peace of mind knowing you have the right technology working for your business with compliance built in.

Book Your Free IT Strategy Call Now!

Simply Fill In The Form Below To Receive Your Free IT Strategy Call:

By submitting this form, you consent to us using your personal information to contact you. For more information please see our privacy policy.