The internet router is one of the most important devices in your home office. The set up and security of the internet modem/router should be your top priority. Without a solid connection you will not be able to connect to the outside world. The lack of a secure internet connection will transform all your expensive equipment into useless hardware.
The good news is that networks can be set up and protected by performing a few common-sense steps.
Remember, that once the connection is made, router configurations also need to be implemented that will secure the device and protect you and others from cyber-attacks. Malicious actors can sneak into devices and gain access to your system. The good news is that by following a few simple steps you will see how to easily basic configuration changes that will protect online identity, financial, and other personal information.
Location – The importance of installing the ISP modem/router in a good location cannot be overstated.
First rule, physical access to the modem/router should be limited. Before you call the ISP to install the internet equipment, see if you can identify a central, out of the way, location in your home for the modem. Avoid the normal impulse to install the device in a high-traffic room, such as the living room. Secondly, wireless signal range should not reach too far outside your home. Reducing outside wireless range lowers the possibility of easy interception from malicious persons. Take care that cables, power adapters, and electrical wiring is either hidden or placed securely out of the reach of children and pets.
If you live in a townhouse, condo, or apartment, check the installation rules or requirements with your landlord or homeowner’s association. A central location will provide an even broadcast of the WiFi signal and may avoid the need to purchase and install a wireless extender. If your device is already set up, you might easily relocate it.
Third, if the effort appears to be too difficult, you might be able to contact your internet provider and ask for an onsite visit by a technician. All ISP’s such as Comcast, AT&T, and others are geared up for this sort of work. A relocation of a modem should not be too difficult for a trained technician.
Security – Once the wireless router is set up your done, right?
Unfortunately, we live in the age of ransomware attacks, data breaches, other cybersecurity threats. Begin this step by reviewing the User Guide for the router. Normally this document can be easily found on the Support website of the service provider. Locate the sections relating to changing passwords and how to configure the other security settings that are detailed below. Note that these settings are typically very easy to do, but a quick read of the manual makes the process go quickly. The investment of a few minutes performing a review of the router getting started guide will avoid significant headaches.
Change Default User Name and password – changing the user name and password on the router is often the most overlooked security violation. Wi-fi routers have default credentials such as “admin” and “password” which are easy to guess. Change these credentials to something unique. Do NOT use familiar terms, such as home address or your name. Also, change your password to a unique term or phrase known only to you or people you trust. A good password should be at least 20 characters long and include numbers, letters, and various symbols. This is an example: Md8*7Dqhnv&aZ02@effZ
Typically, the core reason of performing this task has been prevent neighbors, or others from easily connecting and getting a “free ride,” on a wireless connection. However, a few additional security configurations need to be performed.
Change the WiFi network name and password – once access to the router is secure with a new name and password, you need to configure the wireless SSID (Service Set Identifier). The SSID is the wireless network name is the unique name that the router broadcasts to the outside world. Typically, an SSID will appear on your computer wireless network settings as something like, “Xfinity Secured,” or “Joes Network Secured.” Change the name to something unique. Do NOT use familiar terms such as home address or your name. To clarify a bit. Change any reference regarding the make or model of the router or service provider. Names such as “Xfinity,” “ATT,” or “Netgear,” provide the cybercriminal with a starting point that can be researched for device access information.
SSID names such as “this is not a wifi” or “too fly for a wifi” are perfectly acceptable. One other item regarding SSID. There is an option to turn off SSID broadcasts from your router. Drop by the Tech Terms page to read how to log onto a “hidden,” SSID.
Wi-Fi security via network encryption – wireless networks have multiple encryption options.
WPA2 – or, Wi-Fi Protected Access 2 – is both a security protocol and a current standard in the industry (WPA2 networks are almost everywhere). This technology replaces the older and less secure WEP (Wired Equivalent Privacy). Do not use WEP as it is weak and easily hacked.
All Wi-Fi certified products are by default configured to use WPA2 security.
WPA3 – will replace WPA2. The Wi-Fi Alliance recently announced its next-generation wireless network security standard which aims to solve a common security issue: open Wi-Fi networks. More than that, it comes with security enhancements and includes a suite of features to simplify Wi-fi security configuration for users and service providers. More detailed information surrounding wireless encryption can be found at Tech Terms.
Turn off the wireless – taking a vacation, or going out of town for a few days? After boarding the pooch, and before you set the alarm, be certain to turn off the wireless feature. There are zero reasons for leaving it on when you are away. Also, take a minute to check to make certain that all devices that connect with Ethernet cables (TV, Stereo system, game consoles) to the router are turned off as well. Simply put these steps close windows of opportunity that can be exploited by malicious hackers while you are away.
Devices that are powered off will be less likely to suffer damage due to power outages, or surges.
When the preceding steps are completed, an online criminal will have great difficulty exploiting a network. Proper Wi-fi security measures will reduce, and probably eliminate the ability of bad actors “listening” to sensitive network traffic. At that point, it is easy to retrieve sensitive information, such as Facebook, or other online information. These settings will also reduce the possibility of malicious Man-in-the-Middle attacks, network sniffing or other types of data theft. Read more about these attacks on the Tech Terms page.