Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.
But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. As WLANs send information over radio waves, someone with a receiver in your area could be picking up the transmission, thus gaining access to your computer.
They could load viruses on to your laptop which could be transferred to the company's network when you go back to work.
Up to 75 per cent of WLAN users do not have standard security features installed, while 20 per cent are left completely open as default configurations are not secured, but made for the users to have their network up and running ASAP.
It is recommended that wireless router/access point setup be always done though a wired client.
Change default administrative password on wireless router/access point to a secured password.
Enable at least 128-bit WEP encryption on both card and access point. Change your WEP keys periodically. If equipment does not support at least 128-bit WEP encryption, consider replacing it.
Although there are security issues with WEP, it represents minimum level of security, and it should be enabled.
Change the default SSID on your router/access point to a hard to guess name. Setup your computer device to connect to this SSID by default.
Setup router/access point not to broadcast the SSID. The same SSID needs to be setup on the client side manually. This feature may not be available on all equipment.
Block anonymous Internet requests or pings.
On each computer having wireless network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.
Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses should be registered with the router /access point.
Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.
You can test your hardware and personal firewalls using Shields Up test available at http://www.grc.com
All computers should have a properly configured personal firewall in addition to a hardware firewall.
Update router/access point firmware when new versions become available.
Locate router/access point away from strangers so they cannot reset the router/access point to default settings.
Locate router/access point in the middle of the building rather than near windows to limit signal coverage outside the building.
While none of the measure suggested above provides full protection as counter measures exist, a collection of suggested measures will act as a deterrent against attacker when other insecure networks represent easier targets.
The author of this article ia a software developer, consultant and author of numerous books. Visit his site for more information about the Top Spyware Removal Software.
Everyone should eliminate spyware and adware from your hard drive... Read More
Identity theft is one of the most common criminal acts... Read More
Imagine my surprise when I received a phone call from... Read More
A couple of years back, I paid my dues the... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
First the basic definition of Spyware: It is a type... Read More
File sharing on p2p is soaring despite the music and... Read More
Nowadays more and more people are using a computer. A... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Spyware protection software is the easiest way of removing spyware... Read More
A friend called me one day and asked if I... Read More
Do you really have to know how feeds work? Not... Read More
With the Internet entering our lives in such an explosive... Read More
I got a virus the other day, Thursday I believe... Read More
Before you enter your name, address or any other data... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
If you are a parent, you have probably wondered at... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
This is not some new fangled techno-speak, it is a... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Ebay is a great site and is used by many... Read More
Watching how the traditional media covers the latest virus or... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
A few nights ago I received an email from "2CO"... Read More
If you run any type of Internet business, Adware and... Read More
The money being spent online is steadily growing. With billions... Read More
In today's times spyware is a very serious issue and... Read More
If you use emails actively in your communication, you must... Read More
This is the second in a series of articles highlighting... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Identity theft rates one of the fastest growing crimes in... Read More
So called phishers try to catch the information about the... Read More
In the past I've never really paid much attention to... Read More
Working from home has its advantages, including no commute, a... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Identity theft is one of the most common criminal acts... Read More
By browsing a web page, you could infect your computer... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
The words Corporate Security may conjure up images of a... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
A couple of days ago, I was searching for a... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Ebay is a great site and is used by many... Read More
Well, if that would have been said to me by... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
It's late. You've been scouring the web for that perfect... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Spyware and adware are becoming major problems for online surfers... Read More
There you are busily typing away on your PC or... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Whether we like it or not, we are all living... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
First, let's do a little recap'. As I stated in... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Every day millions of people go online to find information,... Read More
Fishing on the Internet has come a long way. However,... Read More
Before we start, I want to make it clear that... Read More
Internet Security |