Wireless Security
The prevalence of wireless Internet connectivity is on the rise due to availability, convenience, and the need to connect when traveling. Business travelers use wireless laptops to stay in touch with their home office, vacationers send photos to friends while still on their trip, and shoppers place orders from the comfort of their home.
A wireless network connects computers in different parts of your home or business without a tangle of cords, enabling you to work on a laptop from anywhere within range of the network. It also allows connection to the Internet from any available wireless connection. Wireless "hot spot" connections are commonly found at coffeehouses, airports, hotels and restaurants.
A typical home wireless network consists of a broadband Internet connection (such as a cable or DSL line connected to a modem) and a wireless access point (sometimes referred to as wireless router or base station) which broadcasts a signal, sometimes as far as several hundred feet. Any wireless-equipped computer within range can gain access to the Internet by connecting through the access point.
Wireless Concerns
The proliferation of wireless connectivity increases security risks. Without taking certain precautions, anyone with a wireless-ready computer can use your network. Your neighbors, or even nearby hackers, can "piggyback" on your network, or possibly access the information on your computer. If an unauthorized person uses your network to commit a crime or send spam, the activity can be traced back to your account. The good news is there are steps you can take to protect your wireless network, your networked computers, and your wireless laptop used in public "hot spots" or while traveling.
The following steps should be used together to provide adequate wireless security.
How Can I Protect Myself?
- Use encryption. The most effective way to secure your wireless network from intruders is to encrypt, or scramble, communications over the network. Most wireless routers, access points, and base stations have a built-in encryption mechanism that you must set-up. The directions supplied with your wireless router should explain this process. If they do not, check the router manufacturer's website. The two most common types of encryption are Wi-Fi Protected Access (WPA) and WPA2. Your computer, router, and other equipment must all use the same encryption. WPA2 is the current standard and should be used exclusively, unless WPA3 is available. It should protect you against most hackers, but by itself is susceptible to sophisticated hacker attacks. Use a long/complex/unique password to gain access to your network. Certain older routers use only WEP encryption. Never use WEP, as it is no longer considered a secure encryption method. Please upgrade your wireless router if this is the only encryption method available. Gaining a password through WEP is trivial and well known. Also, some routers allow Wi-Fi Protected Setups (WPS) to make adding devices to the network easier. WPS was designed with flaws, and is considered insecure as well. Please disable WPS, if your router has it.
- Use anti-virus and anti-spyware software, and a firewall. Computers on a wireless network need the same protections as any wired computer connected to the Internet. Install anti-virus and anti-spyware software, and keep them up-to-date. If your firewall was shipped in the "off" mode, turn it on. For more information on anti-virus, anti-spyware and firewall protections, please see the complementary courseware within this Training, Education and Awareness Module entitled Viruses/Worms, Trojans and Spyware or Home Firewalls.
- Change the default identifier on your router. The identifier for your router is likely to be a standard, default ID assigned by the manufacturer to all hardware of that model. Even if your router is not broadcasting its identifier to the world, hackers know the default IDs and can use them to try to access your network. Change your identifier to something known only by you, and remember to configure the same unique ID into your wireless router and your computer so they can communicate.
- Change your router's pre-set password for administration. The manufacturer of your wireless router probably assigned it a standard default password that allows you to set up and operate the router. Hackers know these default passwords, so change it to something known only by you. The longer the password, the tougher it is to crack.For more information on choosing a strong password, see the complementary courseware within this Training, Education and Awareness Module entitled Creating a Secure Password.
- Turn off your wireless network or your wireless adapter at times when you know you will not use it. Hackers cannot access a wireless router when it is shut down. If you turn the router off when you are not using it, you limit the amount of time that it is susceptible to a hack. If you are traveling with your device but not connecting to the Internet, be sure to disable your wireless adapter.
- Do not assume that public "hotspots" are secure. Many cafés, hotels, airports, and other public establishments offer wireless networks for their customers' use. These "hotspots" are convenient, but they are typically not secure. Be wary about sending or accessing information from a public wireless network. When using public hotspots, always assume that other people can access any information you see or send over a public wireless network. Unless you can verify that a hotspot has effective security measures in place, it may be best to avoid sending or receiving sensitive information over that network. Also, be wary of "shoulder surfers" who will try to watch you type your password from behind and never leave your laptop unattended.