Skip to main content

Ensure security of your network

Whether you are using a wired router or a wireless one, if it is not configured properly, both of them could pose potential security risks. The common notion that wireless routers or networks are not secure or less secure is true, but only in circumstances where it is used right out of the box without correctly configuring its security settings. If your wireless network is ‘unsecured’ or ‘open’, an intruder can easily gain access to your internal network resources as well as to the Internet, all without your consent. Use following steps to ensure security of your network.


Configure stronger encryption
Enable Wireless protected access (WPA) and ideally WPA2. This provides much stronger encryption for securing your communications than WEP, which hackers can easily crack.


Use a strong password
Even WPA2 can be cracked by the bad guys if you don't use a secure password. You won't have to type your password very often, but it could prevent bad guys from watching what you do online. Ensure too that cyber criminals can use cloud services to aid password cracking, so even a seemingly secure but shorter password may not be safe.


Ensure your authentication strategy
If you are using WPA2-PSK, your employees, friends or family will all be using the same password, and may unintentionally share it with others. Ensure that any of them can see your network traffic. If an employee leaves the company, they may retain your network key allowing them to later decrypt your traffic or access the network. For larger organizations, consider using a certificate-based authentication mechanism or RADIUS so that each user has their own managed  credentials. That way they avoid accidentally sharing access to your network. There are many strong authentication deployment modes available for you to use in a good enterprise wireless
solution.


Change the name of your network
It’s a little known fact that the network SSID (such as “Home” or “Free Public Wireless”) is actually part of the security for encrypted networks.* Using a default name can make it easy for attackers to guess your password quickly. Try to use a unique name, but also make sure not to give too much information away, as it may tempt attackers to target you.


Configure SSID hiding carefully
SSID hiding is a feature which hides your network name from the list that people in the area can see on their computers or mobile devices. This means a user has to manually configure the network name and password. SSID hiding reduces temptation from casual attackers, so it’s a useful feature.
However, be aware that within a few seconds any attacker with basic knowledge will reveal this wireless network name. It is a very light defense that you shouldn't rely on. Make sure you combine it with strong encryption and a good password.

Be cautious of device authorization lists
MAC address filtering prevents devices that aren’t on an authorized list of allowed hardware devices from using your network. This feature is often presumed by administrators to be a strong defense. Unfortunately, these MAC addresses can be easily forged by intruders. Having to manually authorize these addresses within your organization can also be a significant administrative burden. It’s a good practice to follow the principle of "defense-in-depth.” However, we recommend not using
MAC address filtering. Instead, focus your efforts on strong passwords and encryption.


Manage the names of networks you've previously used
By default, most devices will Ensure networks you have previously connected to. For example, if you used a hotel's wireless connection, your device will likely Ensure its name and search for that network wherever you travel. Attackers' wireless scanning tools will identify your laptop or mobile device and see that it has previously connected to a network with this name, even if it’s not presently in range. This may not seem like a significant issue, but wireless network names may give away key information such as the business you work for, hotels or sites you have visited, or in extreme cases your address (we’ve seen networks named after street addresses). Ensure to remove such profiles after use if they give away sensitive information.  


Protect yourself on open networks
If you connect to an open hotspot such as those commonly provided by hotels, you need to take additional steps to be sure your traffic isn't visible to hackers. Make use of a strong VPN to encrypt all of your traffic over the wireless network. You should also check the hotspot is legitimate when providing credit card details or login information, as sometimes hackers set up fake hotspots.


Practice defense-in-depth
Network security is only one layer of a good security strategy. You should follow best practices for endpoint protection, patching and web security. With the right security practices you can keep yourself secure even if your wireless network is compromised, reducing the odds of a hacker getting away with your data.

Manage visitors and restrict traffics
If you are a business that needs to provide guest or consultant access, consider offering a separate network with restrictions on what guests can access. A hotspot registration portal can be an easy way to restrict access without a lot of administrative effort. Wireless solutions should enable you to easily deploy such networks, allowing visitors only access to the Internet and keeping them away from corporate services.

Manage your wireless access points
Make sure that your wireless access points (particularly those of branch offices’ and other locations) use the correct security configuration. Many enterprises may have secure wireless at headquarters, but then have weak access point configuration at branch offices’. These can act as a back door to the enterprise, undermining your security efforts. Policy management and remote logging are therefore a priority to make sure security is consistent across your environment

Comments

Popular posts from this blog

Teach from home

Seeking volunteers for mentoring aspirants for different competitive exams. Benefits:  - earn handsomely - contribute to the creation of world-class content - teach from the ease of your home - help in building new horizons of learning Your help can give countless people around the country, the Guidance - the one thing they need most.  to connect: drop an email at contact@eprabodh.in

How to convert your Classes/Courses/Tuition into an online course without spending any money?

Using a variety of online services available for free on the internet you can convert your Classes/Courses/Tuitions into an online course without spending any money. Using a web blog, a page on Facebook, or other social network pages can be a central hub where the course syllabus and activities can be scheduled. An outline for the course can be created. Document sharing tools like Google Drive, DropBox, One Drive can be used to share the important notes and course contents. Tools like Skype, Whatsapp, Google Duos, Hangout can be used to communicate and hold webcam based meetings. Instagram and other photo sharing tools can be used to share photographs. To share videos services like Vimeo and Youtube can be utilized. Tools like Camtasia can be used to capture screenshots and record synchronized lecture or explanations about them. But, if you choose these mix of different online tools instead of a dedicated LMS, Many challenges arise, including the follow

Why should I use ePrabodh?

Why should I use ePrabodh Learning Management System? What is ePrabodh LEARNING MANAGEMENT SYSTEM? ePrabodh LMS is a learning portal or an online learning platform meant to automate the delivery of eLearning and mobile learning courses to learners. To put it simply, add users, add courses, and assign courses to learners, and view reports of completion, test scores, certificates, and analytics data. It is a software tool that not only automates the learning process, but also gives the learner and educator an interactive and intuitive interface. Benefits of Using  ePrabodh LMS 1. Centralized Hub for Information 2. Learn on the go – any time, any place! 3. Building and Taking Courses is fun 4. Better Instructor-Learner Collaboration 5. Easier to manage Online Exams, Certificates and Analysis Centralized Hub for Information ePrabodh  Learning Management System serves as a host for all your learning assets, training materials, courses, user information, performance repor