Wireless Network Security

Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.

But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. As WLANs send information over radio waves, someone with a receiver in your area could be picking up the transmission, thus gaining access to your computer.

They could load viruses on to your laptop which could be transferred to the company's network when you go back to work.

Up to 75 per cent of WLAN users do not have standard security features installed, while 20 per cent are left completely open as default configurations are not secured, but made for the users to have their network up and running ASAP.

It is recommended that wireless router/access point setup be always done though a wired client.

Change default administrative password on wireless router/access point to a secured password.

Enable at least 128-bit WEP encryption on both card and access point. Change your WEP keys periodically. If equipment does not support at least 128-bit WEP encryption, consider replacing it.

Although there are security issues with WEP, it represents minimum level of security, and it should be enabled.

Change the default SSID on your router/access point to a hard to guess name. Setup your computer device to connect to this SSID by default.

Setup router/access point not to broadcast the SSID. The same SSID needs to be setup on the client side manually. This feature may not be available on all equipment.

Block anonymous Internet requests or pings.

On each computer having wireless network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.

Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses should be registered with the router /access point.

Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.

You can test your hardware and personal firewalls using Shields Up test available at http://www.grc.com

All computers should have a properly configured personal firewall in addition to a hardware firewall.

Update router/access point firmware when new versions become available.

Locate router/access point away from strangers so they cannot reset the router/access point to default settings.

Locate router/access point in the middle of the building rather than near windows to limit signal coverage outside the building.

While none of the measure suggested above provides full protection as counter measures exist, a collection of suggested measures will act as a deterrent against attacker when other insecure networks represent easier targets.

The author of this article ia a software developer, consultant and author of numerous books. Visit his site for more information about the Top Spyware Removal Software.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Gizmodo

Amazon is now selling home security services, including - TechCrunch
TechCrunch
Amazon's made a slew of acquisitions in the area of smart home services, and now it's offering a product that brings them together under one roof — your roof. Amazon has quietly launched a portal offering home security services — which include all ...
Security Researchers Created a 'Skill' that Allows Alexa to Spy on YouGizmodo
Amazon launches home security services; Alexa gains memory, more conversationsSeeking Alpha
Is Alexa spying on YOU? Security researchers reveal how the assistant's code could be tweaked to create new 'skill ...Daily Mail
Boing Boing -Investor Relations Solutions -Tech Times -Checkmarx
all 190 news articles »

Washington Post

Top Homeland Security officials urge criminal prosecution of parents ...
Washington Post
The nation's top immigration and border officials are urging Homeland Security Secretary Kirstjen Nielsen to detain and prosecute all parents caught crossing the Mexican border illegally with their children, a stark change in policy that would result ...
Homeland Security officials want to prosecute all parents who cross border with kids: reportThe Hill
Lawmakers slam Trump's Homeland Security chief over focus on immigrant caravan, border wallCNN

all 26 news articles »

Digital Trends

Reolink's latest breakthrough pulls the plugs on smart security cameras
Digital Trends
After a string of successes, Hong Kong-based security camera manufacturer Reolink is getting good at crowdfunding campaigns. Its latest project to land with a smash on Indiegogo is the Reolink Go, a powerful 4G-enabled, solar-powered security monitor ...

and more »

Washington Post

Mattis: US would regret delegating security in Syria to a force with no American involvement
Washington Post
Defense Secretary Jim Mattis said Thursday that the United States would regret installing a holding force in Syria without American involvement, indicating military leaders harbor reservations about a White House effort to task Arab militaries with ...

and more »

Herald-Mail Media

WCPS superintendent talks safety, security at listening session
Herald-Mail Media
Safety and security remain on the minds of Washington County Public Schools students and parents as the district works to identify potential improvements. WCPS Superintendent Boyd Michael again fielded questions on the topic during a listening session ...


CNN

Deputy US marshals on Rosenstein security team save woman after ...
CNN
Last year, Deputy Attorney General Rod Rosenstein traveled to China to press leaders on the country's export of the lethal synthetic opioid fentanyl to the United States.

and more »

Bloomberg

How Short Sellers Built a Business on Security Bugs
Bloomberg
In an email sent to the general security inbox maintained by the Santa Clara, Calif., chipmaker, an executive of a security company located on the other side of the world claimed to have discovered 13 critical vulnerabilities in AMD's line of chips ...


CBS News

National security experts on challenges of the American presidency ...
CBS News
National security issues are dominating President Trump's time, including Iran's nuclear program, military operations in Syria, Russian aggressiveness, the rise of China and a high-stakes upcoming summit with North Korea. In the cover story for the May ...

and more »

The Japan Times

Tight security surrounds Kim Jong Un, even more so than previous North Korean leaders
The Japan Times
Ri Yong Guk, a defector from the North who served on a security detail for Kim Jong Il, wrote in a 2013 memoir that as many as six different layers of security guards protected the leader on trips to the countryside to inspect military units, plants or ...
Kim's Jong Un's Security: "Not Even An Ant Can Pass Through"NDTV

all 3 news articles »

Brookings Institution

Redefining national security: Why and how
Brookings Institution
From climate change to public health to migration, global trends formerly considered separate from national security are increasingly understood to shape American security interests at home and abroad. Drawing connections to U.S. national security has ...

Google News

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

Free Spyware Removal - Its Not As Easy As It Sounds

Nobody wants to pay to remove spyware. At the very... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More