Home wireless: how to protect your network security

Source: Internet
Author: User

The weakest link in network security is the wireless network used by Home Office users. IT administrators must analyze unprotected networks they use and take measures to mitigate the risks. For example, administrators can implement an effective remote access policy to help users protect their networks from attacks.

In the article "self-white of a wireless network thief" published on Time.com, Levi's Rosman introduced how to use others' wireless networks for free. The first thing I did when I moved into my new apartment three years ago was to sit in a box and open my laptop to find wireless access points. As a result, I found that the apartment is surrounded by various wireless networks that can be used at will ....... In the next three years, I have not paid any fees for network access. All the data is from insecure wireless networks of neighbors.

Discussing whether to support or oppose the theft of wireless networks from the ethical and ethical fields is another issue. grousman's article reminds us that, the weak links in the networks around us often exist in the end users of the Home Office.

For end users, using virtual private networks and powerful access control and identity authentication tools is a necessary means to ensure the security of their wireless networks. IT departments often emphasize their importance. In addition, we should not only provide more help to home users in information, but also include devices. However, I do not recommend that you manually configure the home network devices of each user, which is often impossible to complete. Instead, I suggest conducting a promotional activity to help users understand the importance of network security and common methods for configuring the home network.

Create, assign, and execute a valid Remote Access Policy

An effective remote access policy should be established first, and each remote user should receive and sign the policy manually or electronically ). TechRepublic is a good place to provide a lot of relevant information when the company starts creating policies.

Provide information about General Wireless Network Security

Whether or not they are part of your remote access policy, publish them on the IT department's Intranet or by email, the following tips about wireless network security are good options for users to learn about Wireless Network Security:

Use wireless network protection access mode WPA) or wireless network protection access mode WPA2) instead of dynamic Wired Equivalent security mode WEP) for wireless network encryption.

The SSID of the broadcast service set identifier is prohibited.

Use the firewall.

Use a strong and easy-to-remember password.

Periodically monitors network access.

Related Articles]

  • Proficient in home wireless network settings

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.