Are your neighbors snooping through your computer?
Wireless networks are one of the most inherently insecure networks you can run. Because of this fact, most businesses who take their networks seriously would not expose their valuable information through a wireless network. But for those of us who use them at home for personal and convenience reasons (that being me), there are a few things you can do to deter would be hackers (or your next-door neighbor) from penetrating your network. (2014, Difference between WPA and WPA2)
Encrypt your wireless network with WPA2 (Wireless Protected Access 2)
This encryption is fairly standard on almost every wireless router available for purchase. WPA2 is an improvement on the previous version WPA by not using the TKIP algorithm and instead using the industry and DOD standard AES. You may have heard of WEP, this is not an encryption we recommend due its encryption being extremely weak; however it is better than using nothing at all.
Disable SSID broadcast or make it unique
Another fairly common method of making your wireless network that much harder to detect is to disable SSID broadcast. This is accomplished from the management console of your wireless router. This ensures that your network is not broadcasting publicly which allows it to found much more easily, and targeted more often. This can make it a little bit more difficult to add new devices to the network.
Enable MAC address filtering
Out of all of the different steps that can be taken to secure your network, MAC address filtering is one of the most important. Again, it can be cumbersome anytime someone comes over to visit or you need to add a new device. MAC filtering does a good job of adding another layer of security to your network. MAC filtering is not fool-proof though, it is susceptible to spoofing and MITM attacks.
Advance Persistent Security recommends not keep sensitive information stored on a computer attached to a public wireless network and if you use a private wireless network, ensure it has proper encryption. There are many places to store sensitive data and a wirelessly connected computer is not one of them.
Other High Profile Breaches:
Experian (includes T-Mobile)
Tesla and Chrysler (unrelated to each other)
Apple App Store
U.S. Office of Personnel Management (OPM)
Kaspersky & FireEye (unrelated to each other)
Excellus Blue Cross Blue Shield
Ashley Madison (follow up)
Thanks for stopping by and reading our blog. We would appreciate if you could subscribe (assuming you like what you read; we think you will). This is meant to be informative and to provide value to anyone who reads this – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.
Be sure to subscribe to this blog and to our Podcast.
If you have ANY Cybersecurity needs, please contact us and a member of our staff with promptly reply to your question or concern.