{"id":3850,"date":"2015-07-30T08:23:02","date_gmt":"2015-07-30T13:23:02","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=3850"},"modified":"2015-07-14T13:13:40","modified_gmt":"2015-07-14T18:13:40","slug":"wifi-security-what-you-should-know","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/wifi-security-what-you-should-know\/","title":{"rendered":"WiFi Security: What You Should Know"},"content":{"rendered":"<p><span style=\"font-family: verdana,geneva,sans-serif;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3908\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/wifi-and-security.png\" alt=\"WiFi and Security\" width=\"185\" height=\"185\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/wifi-and-security.png 185w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/wifi-and-security-150x150.png 150w\" sizes=\"auto, (max-width: 185px) 100vw, 185px\"><\/span><span style=\"font-family: verdana,geneva,sans-serif;\">Okay. So, you\u2019re on the road. And you suddenly remember that vital email you neglected to send, before leaving the office. Or you get an urge to post that selfie you just took to your Instagram account. Laptop or mobile device at the ready, you connect to the Web using the free service at the hotel, conference center, or train station where you\u2019re currently sitting.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">It sounds great in principle. But connecting to the Internet from a WiFi hotspot is fraught with hidden dangers. But there\u2019s no need to panic as this guide will help you minimize the risk.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><b>What are The Risks?<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><b><a href=\"http:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/the-risks-of-using-wifi.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-3904\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/the-risks-of-using-wifi.png\" alt=\"The Risks of Using WiFi\" width=\"185\" height=\"185\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/the-risks-of-using-wifi.png 185w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/the-risks-of-using-wifi-150x150.png 150w\" sizes=\"auto, (max-width: 185px) 100vw, 185px\"><\/a><\/b><\/span><span style=\"font-family: verdana,geneva,sans-serif;\">Recent survey results suggest that 70% of people who own tablets and 53% of smartphone users regularly use public WiFi hotspots. But sensitive data sent across public WiFi networks \u2013 things like credit card details, login information and digital credentials \u2013 can be intercepted fairly easily by unscrupulous parties. That\u2019s why <a href=\"\/blog\/keeping-cybercrime-out-tips-on-network-security\/\">cybercriminals target public WiFi<\/a> so often.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Any WiFi connection that\u2019s unsecured is an opportunity for hackers to gain access to sensitive (and potentially valuable) information \u2013 and even to take control of the network, itself.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Securing Your Home Network<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><a href=\"http:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/wifi-and-a-secure-home-network.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3905\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/wifi-and-a-secure-home-network.png\" alt=\"Wifi and a Secure Home Network\" width=\"185\" height=\"185\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/wifi-and-a-secure-home-network.png 185w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/wifi-and-a-secure-home-network-150x150.png 150w\" sizes=\"auto, (max-width: 185px) 100vw, 185px\"><\/a>A broadband router (also known as a wireless router, access point, or hub) is usually required to set up and access a home WiFi network. The manufacturers of these devices typically set up a website with a login screen, where users can enter their username and password, then input details like their account information and network address. These pages are initially accessed via a default administrator password and username, specific to each manufacturer and well-known to most hackers. You should change both immediately.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Routers ship with a manufacturer-specific network name called the Service Set Identifier or SSID. Although knowing an SSID won\u2019t allow access in itself, a hacker who sees a network still using the default value will assume that your network isn\u2019t well configured and potentially vulnerable. So you should change the SSID as well.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Once WiFi is up, the hub will broadcast the SSID at regular intervals to allow WiFi clients that roam in and out of the signal range to reconnect. As network administrator, you can disable SSID broadcasting. But know this, first: In Windows 7 and above, an SSID that\u2019s not broadcast will still display as an \u201cOther Network\u201d. And a hacker spotting a network that someone\u2019s attempting to hide may assume that it contains something worth hiding.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">In a <a href=\"http:\/\/compnetworking.about.com\/od\/wirelesssecurity\/tp\/wifisecurity.htm\" target=\"_blank\" rel=\"nofollow\">home network<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, the position of the wireless router determines the reach of its signal. If you want your WiFi to be accessible to all and sundry, place the hub near a window or out in the open. Otherwise, try to keep it near the center of the house.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">If you\u2019re away on holiday, or offline for extended periods, consider turning off the equipment, entirely. Whenever you are online, be sure that you have a firewall in place. Most modern routers have one built in, but they can be disabled. So make sure it\u2019s turned on, at all times. You might also consider installing personal firewall software on each device that connects to the network.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Your greatest protection will come from encryption, however. Even if encrypted data is intercepted by hackers, it will take some major effort on their part to unscramble that information, and use it. So be sure to enable the encryption option that comes with your network hardware.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><b>About Encryption\u2026<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-3906\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/wifi-and-encryption.png\" alt=\"WiFi and Encryption\" width=\"185\" height=\"185\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/wifi-and-encryption.png 185w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/wifi-and-encryption-150x150.png 150w\" sizes=\"auto, (max-width: 185px) 100vw, 185px\">The earliest routers used Wired Equivalent Privacy (WEP), but this <a href=\"http:\/\/www.pcworld.com\/article\/2052158\/5-wi-fi-security-myths-you-must-abandon-now.html\" target=\"_blank\" rel=\"nofollow\">encryption method<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> was soon displaced by the more secure WiFi Protected Access (WPA) system. This has evolved to WPA2.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">WPA and WPA2 can operate in two different modes. Pre-Shared Key or PSK mode is the Personal setting, designed for home networks. To use it, you set up a password on your router and grant access to each device on your network via that same password. It\u2019s essential to use a strong password, i.e. a mix of alphanumeric characters (small and caps) and symbols.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">RADIUS, or Remote Authentication Dial In User Server is the Enterprise encryption setting, designed for corporations and agencies. It gives a higher level of encryption security, but requires the use of a RADIUS server or hosted RADIUS service.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">You may have to determine a common setting, as all devices on a home network need to use the same encryption protocol.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Being Safe, in Public<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3903\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/public-free-wifi-security-tips.png\" alt=\"Public Free WiFi Security Tips\" width=\"185\" height=\"185\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/public-free-wifi-security-tips.png 185w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/public-free-wifi-security-tips-150x150.png 150w\" sizes=\"auto, (max-width: 185px) 100vw, 185px\">By its very nature (open to everybody), <a href=\"http:\/\/lifehacker.com\/5576927\/how-to-stay-safe-on-public-wi-fi-networks\" target=\"_blank\" rel=\"nofollow\">public WiFi is insecure<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>. And that risk can manifest from the very beginning.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">A malicious user can easily set up a bogus WiFi link. So don\u2019t connect to any network whose name you don\u2019t recognize. Even if you are familiar with the name, it may be a spoof. Cybercriminals love setting up bogus WiFi links with names similar to established brands or popular locations.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Before connecting, talk to the staff at the venue where WiFi is being offered. Find out the IP address and connection name of their legitimate service \u2013 and compare them to the data that\u2019s being given by the link, before you proceed.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Don\u2019t share. If your home or office settings enable resources like printers and collaborative files to be shared, turn these off, when you\u2019re connecting in public. Otherwise, these facilities will be available to the general public.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Once again, encryption is your best defense. Use HTTPS (HTTP Secure, an encryption protocol) when visiting websites and enable <a href=\"\/blog\/ssl-and-beyond-part-1-history-and-development\/\">SSL (Secure Sockets Layer)<\/a> or <a href=\"\/blog\/ssl-and-beyond-part-1-history-and-development\/\">TLS (Transport Layer Security)<\/a>, to scramble data as it moves between your machine and various Web servers. If you use a desktop client like Outlook to access your email, make sure to set your accounts for SSL encryption. Check the Help documentation, to ensure you set this up correctly.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">The \u201chttps\u201d prefix in the address bar of your Web browser indicates a securely encrypted connection. If those letters disappear, you should log out. Many sites will use HTTPS by default; others will support the protocol if you type it in.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">A virtual private network or VPN will shield your data, encrypting information as it passes through the WiFi network. This can be your best bet when dealing with sites that don\u2019t support SSL. A VPN service will re-route your data through a secure private network, like a tunnel shielding you from the potential threat of the public one.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><b>Your Safest Course\u2026<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u2022 Trust nothing, till it\u2019s been verified. Check out the validity of the hotspot before you connect.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u2022 Protect your system. Enable your <a href=\"\/help\/remoteserverports.aspx?ref=blog\">firewalls<\/a>, anti-malware and security settings.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u2022 Use encryption. <a href=\"\/blog\/how-to-configure-a-public-key-infrastructure-on-a-windows-server-part-1\/\">Enable WPA2 or WPA<\/a>. Look for HTTPS support on the sites you visit. Consider using a VPN service.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u2022 Don\u2019t connect unless you have to. If that email can wait till you\u2019re back on the office network, wait till you get back to the office.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Okay. So, you\u2019re on the road. And you suddenly remember that vital email you neglected to send, before leaving the office. Or you get an urge to post that selfie you just took to your Instagram account. Laptop or mobile device at the ready, you connect to the Web using the free service at the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3907,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,13,6,9,8],"tags":[],"class_list":["post-3850","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-pc-security","category-tech","category-technical","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/3850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=3850"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/3850\/revisions"}],"predecessor-version":[{"id":3960,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/3850\/revisions\/3960"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/3907"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=3850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=3850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=3850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}