Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.
But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. As WLANs send information over radio waves, someone with a receiver in your area could be picking up the transmission, thus gaining access to your computer.
They could load viruses on to your laptop which could be transferred to the company's network when you go back to work.
Up to 75 per cent of WLAN users do not have standard security features installed, while 20 per cent are left completely open as default configurations are not secured, but made for the users to have their network up and running ASAP.
It is recommended that wireless router/access point setup be always done though a wired client.
Change default administrative password on wireless router/access point to a secured password.
Enable at least 128-bit WEP encryption on both card and access point. Change your WEP keys periodically. If equipment does not support at least 128-bit WEP encryption, consider replacing it.
Although there are security issues with WEP, it represents minimum level of security, and it should be enabled.
Change the default SSID on your router/access point to a hard to guess name. Setup your computer device to connect to this SSID by default.
Setup router/access point not to broadcast the SSID. The same SSID needs to be setup on the client side manually. This feature may not be available on all equipment.
Block anonymous Internet requests or pings.
On each computer having wireless network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.
Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses should be registered with the router /access point.
Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.
You can test your hardware and personal firewalls using Shields Up test available at http://www.grc.com
All computers should have a properly configured personal firewall in addition to a hardware firewall.
Update router/access point firmware when new versions become available.
Locate router/access point away from strangers so they cannot reset the router/access point to default settings.
Locate router/access point in the middle of the building rather than near windows to limit signal coverage outside the building.
While none of the measure suggested above provides full protection as counter measures exist, a collection of suggested measures will act as a deterrent against attacker when other insecure networks represent easier targets.
The author of this article ia a software developer, consultant and author of numerous books. Visit his site for more information about the Top Spyware Removal Software.
![]() |
|
![]() |
|
![]() |
|
![]() |
Despite the current wave of identity theft and corporate security... Read More
The money being spent online is steadily growing. With billions... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
You may not realize it, but as you are surfing... Read More
Some months ago, before there was much publicity regarding phishing... Read More
To blog or not to blog? Well, why not? Lots... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Millions of people make purchases online, but many people are... Read More
Many of us have run into an annoying and time-consuming... Read More
Do you really have to know how feeds work? Not... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
The average computer is packed with hidden software that can... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Have you ever got an email asking you to confirm... Read More
Viruses are, however, not the only malicious software programs out... Read More
Ok, ok, I know you've seen them. All those pop... Read More
This really chapped my lips...I recently bought a new computer.... Read More
In a word, no - an email message has always... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Every now and then you can read about a new... Read More
Pharming is one of the latest online scams and rapidly... Read More
In today's times spyware is a very serious issue and... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Can you protect your computer from all possible viruses and... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Imagine this ? you open up your email box and... Read More
A week or so ago, I received an inquiry from... Read More
Did you know...? 1 in 5 children who use computer... Read More
The top five online scams on the Internet hit nearly... Read More
A few nights ago I received an email from "2CO"... Read More
Identity theft rates one of the fastest growing crimes in... Read More
When we think of adware, what comes to mind are... Read More
Every now and then you can read about a new... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
These six ways to prevent identity theft offer you valuable... Read More
By browsing a web page, you could infect your computer... Read More
If you run any type of Internet business, Adware and... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Microsoft routinely releases new security updates, many of which are... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Ebay is a great site and is used by many... Read More
You've seen it in the news - 40 million credit... Read More
Afraid that someone is monitoring your PC or installed a... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Business on the internet is getting down right shameless. This... Read More
The most frustrating part of having Spyware on your computer... Read More
Computer infections can be broken up into 4 main categories... Read More
Today the internet is a mine field of malicious code... Read More
In 1997, I decided after 15 years as a practicing... Read More
Working from home has its advantages, including no commute, a... Read More
When it comes to a secure website and passwords it... Read More
Well, this is an article I never thought I would... Read More
There is no doubt that "how-to articles" have become a... Read More
A couple of days ago, I was searching for a... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Computer security for most can be described in 2 words,... Read More
In recent days, I was one of the unfortunate persons... Read More
If you use emails actively in your communication, you must... Read More
Shopping for horse gifts or other gift items on the... Read More
What is computer security? Computer security is the process of... Read More
Internet Security |