Friday, 7 March 2014

How to secure your Wireless Networks

ADVERTISMENTS



Nowadays most of the peoples, organisation and institutes use Wi-Fi or wireless networks for accessing the internet. Wired networks are not portable from one place to another so they are accessed with in organisation or institutes. But you can access internet in café, public places or in an organisation through Wi-Fi or wireless networks with the help of creating Wi-Fi hotspot. It offered so many advantages over the wired networks. But main problem with this technology is that it is not so much secured. So here I am providing the some of the tips for securing the wireless networks. Wireless networks mainly works on the different types of the routers, Switches or hubs. Number of multiple computers can be connected to the router and which is further connecting to the modem for accessing the internet. Wireless networks basically works on the principal of Wi-Fi hotspot. You can connect to the wireless networks by simply searching the nearby Wi-Fi network and create Wi-Fi hotspot and now you can access the internet.

Tips for securing the Wireless networks

There are so many ways for securing the wireless networks, some of the tips for securing the wireless networks are provided below.

General Network security recommendations

 Keep your computer up to date: To keep the network on your computer safer, turn on automatic updating on each computer. Windows can automatically install important and recommended updates. These updates improved the security, reliability and enhancing the computers.

 Using Firewall and Antivirus: Firewall prevents hackers or malicious software (like virus, threats and worm etc.) from gaining the access to your computer through a network or internet. Firewall keeps worms and hacker out of the computer, but it is not designed to protect against the viruses. So you must install the antivirus and must be updated on regular interval of times and scan your system regularly. Viruses are mainly come from the internet or other email.

 Using Router: As you know wireless networks are mainly depends upon the Hubs, Switches and router, but out of these Routers are the best device for sharing the internet connection because routers have built in firewall and other features which keep your network secure form the hackers or from malicious software.

 Logged on Standard user for Internet Connection: When you are using a program that require internet access, such as web browse or an email, we recommend that you log on standard user rather than as Administrative user, because viruses and worms can’t be stored or run on the computer unless you are logged on as an Administrative user.

 Network Security Key: When you have a wireless network than you should set up a network security key, which turn on encryptions. Because when encryption is turned on than no computers can connect to your networks without security key. The common wireless encryption methods are Wi-Fi Protected Access (WPA), WPA2 and WEP etc.

 Change the default setting of Router: Most of manufacturers use default name and password of the router which anyone can access your networks without your permission. To prevent it, you must have to change the default administrative name and password of the router, so that no one can access your wireless networks without your permissions. Also most of the manufacturers uses router wireless network name SSID (Set Service Identifier). We recommend that you change the wireless network name and also your wireless network can’t be overlapped with the other wireless networks.

 Enable MAC filtering: The MAC (Media Access Control) address is a unique identified number assigned to each computer. So enabling MAC filtering in your router improves the security because in router you have the list of specific MAC address of the PCs and MAC address does not present in this list doesn’t access the networks.

 802.1X authentication: If your networks switches or routers support 802.1X authentication, than it will prevent unauthorised users from easily connecting into your network via an Ethernet wall port. They are not connected to your networks until they enter the valid username or password.

ADVERTISMENTS

0 comments:

Post a Comment