Secure Your Company’s WiFi
WiFi is now an essential tool used by businesses internally, as well as an expected feature by customers frequenting a business. With such a high adoption rate on both sides of the business ecosystem, securing WiFi networks and connectivity is a top priority.
Here are 10 steps you can take to secure your small business WiFi:
- Start with a secure business WiFi router. It all begins with getting the best router, with security and functionality in mind.
- Lock it up for safety. This sounds obvious, but you have probably seen many routers in clear view of the public. Lock your router up so only authorized personnel can access it.
- Update your firmware and software. Make sure you install the latest update for your router’s firmware and the security software of any of the devices accessing your business WiFi.
- Use WPA2 or WPA2 enterprise. An enterprise version WPA2 gives you more control so you can define the usernames and passwords for the people using your WiFi.
- Disable admin via wireless on your router. Even though it is convenient, leaving the “Admin Via Wireless” option enabled provides a gateway to your system.
- Set up private and public access. By setting up private and public access, you separate your network into two access points. (See our WiFi Pro article here to learn more about this!)
- Check all WiFi access points. By regularly checking and reviewing your wireless network access log, you can detect rogue access points in or around your area.
- Use virtual private network (VPN) connection. Use a VPN to mask your real internet traffic so it can’t be detected when you are out in the field.
- Use a discreet name for your network and change the default password. By using a common service set identifier (SSID) name, you make it that much easier for hackers to identify and go after your network. Make it unusual.
- Have an actionable security policy. Sharing passwords, adding unauthorized devices, visiting questionable sites, opening email from unknown sources, and other similar behaviors will counteract all of your security efforts.
To read the full article, see the Comcast Business Community.