HOW TO SETUP AND CONFIGURE WIRELESS NETWORK IN SECURE MANNER

Evette

Evette

Passionate Information Technology Customer Support Specialist Student at Milwaukee Area Technical College
Motivated and determined Information Technology Customer Support student with an anticipated graduation date of Spring 2018.
Evette
Wireless networks are setup based on the administrator or end user’s goals, which includes:  speed, range, and security.  Deploying secure wireless networking is an ongoing practice.  Employing encryption to protect wireless network is one of the best manner to protect your wireless network from attacks and interceptions.  Encryption is the process of preventing unauthorize access by changing information or data into a code.  Wireless network users have an option of choosing between three common forms of secure encryption.  These options are: WEP, WPA. And WPA2.  Details regarding these protocols can be accessed through Wireless Encryption Basics.  Passwords are simply one level of security.  Encryption and selecting the right wireless broadband router are also essential when setting up your wireless network.  Another facet of setup of routers that should be considered is location.  Placement of the wireless router near a window means that your wireless signal range reach too far outside the house where it can be easily interception by cybercriminals.  Place your router in the middle of you house so all rooms have the same internet access.  When you leave on vacation, make sure to disable your wireless network, prevent an opportunity for malicious hackers to attempt to gain unauthorized access to your network. Here are great points about securing your wireless network: New technology on routers has wi-fi protected setup which has a WPS button to lock the device during setup. As with any software, check the manufacturer’s website for updates to your firmware. Disable SSID in your wireless setting which will prevent your device showing up is a list of nearby network. Each device on the network...

How to setup and configure wireless network in secure manner?

Whether it be for home or business, a secure network connection is very important to protect the information stored on your computer or while using the internet. If you want to set up a secure network you must first determine the type of connection you want- either wireless only or the option to cable (Ethernet). Once you have established the type of connection you want for your home or business you can now protect your network. To protect your network you can begin by changing the SSID of your router. It’s recommended to use a SSID that is not recognizable or can be identified by your business or home name to avoid the attention of hackers or even neighbors that may try to use your connection. Once you have chosen an unidentifiable user name you can disable the routers SSID Broadcast setting to prevent hackers from detecting your wireless network. The next step in securing your wireless network is to set up encryption. A 128-bit encryption is more secure but the process will depend on the software installed on your router.  Using a WPA is most effective, WEP have been known to be insecure. Unfortunately, older computers may not support WPA and you will need to WEP by default. If you are able to use WPA you should set your password as a long alphanumeric combination with more than 10 characters that will be hard to guess by neighbors or hackers. If you have a firewall, which most antivirus software includes.  Another way to set up and configure a secure wireless network is to disable wireless administrating. This disables...

Advantages of Wired Workplace Vs. Wireless

The main advantage of a wireless network over a wired one is that users can move around freely within the area of the network with their laptops, handheld devices etc and get an internet connection. Users are also able to share files and other resources with other devices that are connected to the network without having to be cabled to a port. Not having to lay lots of cables and put them through walls etc. can be a considerable advantage in terms of time and expense. It also makes it easier to add extra devices to the network, as no new cabling is needed. If you are a business such as a café, having a wireless network that is accessible to customers can bring you extra business. Customers generally love wireless networks because they are convenient. Wireless networks can sometimes handle a larger amount of users because they are not limited by a specific number of connection ports. Instant transfer of information to social media is made much easier. For instance, taking a photograph and uploading it to Facebook can generally be done much quicker with wireless technology.   The benefits of a wireless network is the lack of physical wires. A wireless network is easy to use and accommodates changes in a network without cords and cables. If you are adding new desks and employees, a wireless network is the easiest logistical choice. With the total proliferation of mobile devices in our lives (a wireless network is easier for employees to connect their personal devices to the network. An easily accessible network is paramount when considering the happiness of an...

How to validate that your home router has not been compromised

If you notice a decrease in internet speeds or difficulty streaming videos, music or loading websites one of the causes could be from a compromised router. Instead of catching a virus by clicking a link or website with malicious software a hacker could have accessed your Wi-Fi connection. The hacker could use your connection to access viruses or view illegal websites and activity. It is important to check the router for devices and users that you or the owner did not authorize. The most convenient way to validate if the router has been compromised or not is to check connected devices list. You will need to login the router (this vary by type of router make and model) and go into the Wi-Fi status page. Opening the WIFI status page will show which devices are connected or have been connected to the network. There are also a large amount of websites that refer 3rd parties to check routers to see if they have been compromised. Web based resources like F-Secure will scan your router and make a diagnosis. Scanning the router consists of ensuring that the signals and requests from your network are going directly to its designated location and not rerouted to a malicious party. If you notice that there is a difference in you network connection, as an extra safety precaution, it is also good to change your password. It is recommended that you still change the password even if you validated it has not been compromised.   Once you have confirmed that your connection has been compromised and secured back to safety, you can change the router...

7 Mistakes to Avoid When Searching for IT Jobs in Milwaukee Area

The job search isn’t exactly the reason we’re students. However, it is something we will probably struggle through. There is plenty of advice for topics like choosing a school, choosing a major, or nailing an interview. When it comes to the job search, it can seem like we’re out there alone. There are obvious things to help the job search, but we could be doing some things wrong without knowing. Here are 7 mistakes to avoid while searching for a great IT job in the Milwaukee Metro Area. 1. Clean up your online image. This is increasingly important and the first thing you should do before getting too deep in the job hunt. Have friends or family run some searches on you. If there are even slightly silly or embarrassing results, employers could be passing on your resume without giving you a chance. Just like all important issues, you want to bury the hurtful things deep, down inside the internet. Honestly, the inappropriate stuff may not be a deal breaker. You just want the good results at the top of the list. 2. Look past the internet. There’s a lot that comes with this topic. You want to utilize everything you can to get your hands on job openings. Check career centers at schools, and not just the school you’re enrolled in. There are staff members in school that are only there to find jobs for students. This is directly linked to networking. The more people you talk to the better. Check out local networking groups like HDI. 3. Use all the right keywords in search fields. If you’re...

How to Share Files Using Dropbox

Dropbox is just one of many cloud-based storage programs. Essentially, you can save files there for you to access when you’re not at home or work. It’s one of the big names in cloud storage and they’re based in San Francisco. Here is a guide to using their free and simple file sharing feature. 1. Start at Dropbox.com This is very straight forward stuff here. If you have gmail and use Google Chrome it’s a breeze. 2. Share a single file. This is just one option for sharing files. Once you have your file(s) uploaded, just select them and click Share. You can select the contacts or email addresses to share them with. You can add multiple recipients and add comments for description. 3. Make a Shared Folder. This option will do exactly what is says. Make separate folders for different topics whether they’re personal or for work.   Just select the members of your shared file group and add a comment.   That’s the file sharing feature of Dropbox. You can get the app on your mobile device and have even greater access to these features.  ...