This article points out just a few items which must be addressed when you have a wireless network. Although the following can apply to your home network, this information is most useful for businesses and home-offices. 

So, what are the immediate items which must be addressed with your new or existing wireless network?

1. First and foremost:

Your network should never be set to "open". An "open" network is a security risk as anyone that can see your network, can connect to it without any challenge and can immediately start "snooping" around, capturing usernames and passwords, and more.

By selecting something other than "open", your wireless network traffic is encrypted. Not only is encryption a requirement for sectors such as healthcare (with HIPAA) but all transmissions these days should be encrypted anyway.

2. Next:

Make sure the main wireless device's administrator's username and password have has been changed from the original default settings. Default credentials are all over the Internet and most are easy to guess anyway.

3. For a business today, the wireless network really has to support temporary credentials. You cannot give visitors permanent credentials. Take a step further and install a wireless network that supports unique credentials for each user and/or device so access cannot be shared. If your Wi-Fi system does not support this level of control, we can recommend equipment that does.

4. The last "must have" item is to have a firewall in place. Your computer probably has one but your network (wired and wireless) needs one too. Check if your wireless device has one built in and if so, activate it. If you use a wireless access point which is separate from your network router (what connects to your Internet service) see if your network router has one built-in.

5. Finally, perform updates to your wireless equipment and/or network router. Just like computers, these devices have occasional updates. These updates must be installed to ensure recent vulnerabilities which have been discovered, can be addressed. Additionally, if your firewall has built-in traffic inspection for viruses and other malware, those signatures must be kept up-to-date.




We love to talk about what we do. CONTACT US

All services provided under the direction of a Certified Chief Information Security Officer (C|CISO) and a Certified HIPAA Compliance Officer (CHCO).