Wireless network security has become a hot topic recently. Many forums have some suggestions on how to protect wireless network security. However, many of these suggestions are mixed, many are actually harmful to wireless network security.
The following IT expert network provides some basic wireless network security suggestions, which will help users better ensure their wireless network security:
1. Wireless Network Adapter
When you do not use the network, we recommend that you disable the wireless network adapter for two reasons. First, extend the battery life. Second, it is the best way to prevent penetration attacks by using Microsoft Windows silent ad hoc network advertisement. Microsoft's self-networking uses zero-default access settings, which gives attackers a chance to access them.
2. Verify the wireless network SSID
The Service Set Identifier (or ESSID) is used to identify different networks. It can contain a maximum of 32 characters. The wireless network adapter can access different networks with different SSID values. This helps to prevent edevil twin. Even If attackers use an attack to generate a wrong wireless network. Simply put, the user does not know that the network is connected to the wrong network, so that the hacker can obtain any traffic that the user accepts and sends.
3. Ensure the security of the Software Firewall
Windows XP and Vista have built-in firewalls, but they are not enough. There are many more powerful functional firewalls on the market, which can fully meet the needs of notebook users.
4. disable file and printer sharing in Windows
This function is disabled by default in Windows, but is required by many users during actual work. Enabling this function is actually opening the "difficult door ". Any unauthorized person can access these files as long as they appear in this wireless network.
5. Do not use wireless networks to transmit sensitive information online.
This is needless to say. The importance can be imagined, but please remind me.
6. The operating system must be upgraded in real time.
In addition to operating systems, as well as anti-virus software, firewalls, Web browsers, and wireless network client programs, these all require real-time upgrades to reduce attacks caused by their own defects.
7. Protect any sensitive information
The personal information retained on the web page will become very useful for hacker attacks. Therefore, some encryption tools can be used if conditions permit.
8. Use encryption technology to surf the Internet
This is important when no virtual personal network or virtual personal network settings are correct. There are many SSL (Security Socket Layer, encrypted Socket protocol Layer) VPN technologies available on the market, so that you can transfer confidential files in a secure channel. There are also some more advanced services, such as super agents.
9. VPN
The limitation of the previous suggestion is that it only applies to network-based applications. But what about some mail applications? For example, Outlook. This is exactly where the virtual personal network has been shown. However, many people simply do not use the virtual personal network. The virtual personal network ensures that users are part of their home or office networks even if they are outside. In this way, all commercial applications, file sharing, and network access are completed by the company's network. There are many options available on the market. We recommend Open personal virtual network.
10. Use Remote Access tools to ensure security
Do not transmit sensitive data over questionable networks. There are some devices that can ensure remote control by people going out of the house using the SSL channel over the home network. In this way, surfing the Internet, sending and receiving emails, and other activities will only be implemented on remote hosts. Therefore, do not transmit data unless it is particularly urgent.
Summary:
People who often use laptops outside should be vigilant. Apart from some daily work, they often need to do some work outside. The above suggestions can protect the information security during their external use.