IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

How Secure is your Wireless Network

15 October 2010 By Saran

Wireless networks which are normally evident in homes right now does provide a lot of comfort as far as Internet options that we see common these days. The same is likewise present in companies, doing away with the standard cable infrastructure and making it easier to clean up your homes without having to worry about tripping on any cable for that matter.

But while such a privilege is another fruit of technology, duty calls as far as limiting network access. Passwords are still the wise investment for securing your wireless network and at the start it does look like a lot of work and a bit complicated. Limiting access by providing a (Media Access Control) MAC address and disabling the SSID broadcast can help in making sure your wireless network cannot be found or detected.

With various technology means today, practically anyone is trying to look for wireless internet. That is how much Internet is being demanded these days. But this includes both sane and malicious people who may want to give problems.

So for people who want to protect their wireless networks, here are some tips you can consider:

  • Don’t use defaults. It is almost always a good idea to change default usernames and passwords and your wireless router is no exception. One of the first things you should do when setting up your wireless network is to change the default administrator username and password.

    Additionally, most routers have a default name, or SSID, for your wireless network (i.e. belkin54g). It’s a good idea to change this for several reasons. First, if you don’t change it, it will serve as a hint to intruders that you probably left the defaults in place everywhere. Second, once an intruder knows what model router you’re using, it’s not difficult to find the default username/password and to look for known exploits.

  • Use encryption. Every good router supports encryption and if you’re not using it, your network’s security is likely to be compromised. If you have newer equipment, use WPA or WPA2 encryption. WEP encryption is less secure.
  • Use MAC address filtering. Every network card, whether it’s wireless or wired, has a unique Media Access Control address (MAC address). A good wireless router will allow you to specify that only certain MAC addresses be allowed to access the wireless network. This can help prevent unauthorized computers from accessing your network.

    Be sure to read your router’s documentation to find out how to set up MAC address filtering. To find out how to determine the MAC address of your network cards, click here.

  • Use your firewall. Most good routers have some sort of firewall built in and it should be used in addition to a good software firewall that is installed on the devices accessing your wireless network.
  • Disable SSID broadcast. By default, most routers “broadcast” their existence to the world. This makes it easier for devices to detect their presence and connect automatically. But this broadcast also gives intruders a target. By making your network “invisible” and setting up devices that need to access it to connect manually when in range, you can make your network less of a target to less-savvy intruders.
  • Source

    Filed Under: Network Security, News, Wireless Security Tagged With: firewall, home, mac, networks, ssid, Wireless

    Putting Up Fences from Internet Spyware and Trojans

    27 July 2010 By Saran

    Harmful objects can be obtained from the web. We are all aware that Malware and Trojans are rampant objects that have been wandering of anywhere on the Internet, especially websites that are often visited by people for reference and information. Such sites would get hijacked and also contaminate visiting users as well, something that can be done through Internet cookies stored on the web folder in the machines.

    Picket Fences on the Web

    While developers and security administrators have religiously searched for ways to find such solutions, the ever changing development of new threats coming from the Internet has been far from over. To date, even the well-protected workstations can still be penetrated by objects that are not immediately visible.

    Internet fences in the form of firewalls and software protection templates have tried to stop such intrusions but need to be updated frequently to answer the related threats. Without such temporary fences that are up, workstations are sitting ducks waiting to be shot, and if web administrators are not up to date with the new threats, the fences used are good as gone once they occur.

    Filed Under: IT Security Basics, Malware, Network Security, Physical Security, Security Policies, Spyware Tagged With: firewall, Malware, Spyware, trojans

    The Potential Threats of Foregoing Cyber Security

    23 May 2007 By Saran

    While most of the world relies heavily today on computers and the Internet, safeguarding data and intrusion from malicious hackers and technology advanced individuals should be the main cause for concern.

    Cyber Security

    It is no secret that most systems that do not have the proper security programs face the risk of potential loss of information or being a cause for downtime for servers that need to be operational 24/7. Without the security perimeter fences installed, a server or workstation is prey to a lot of attacks stemming from hackers, worms and Trojans that are spread all over the Internet today.

    The risk is indeed high considering that a lot of personal and business related programs and files are the bloodstream of most operational works today. Without the proper cyber guards to act as assigned protectors to key data, internal operations and key components in systems will surely be facing threats that may not immediately be recovered by back-up systems alone.

    [tags] internet security, cyber security, cyberspace, cyberworld, firewall, intrusion[/tags]

    Filed Under: Backups, IT Security Basics, Malware, Network Security, Operating Systems, Physical Security, Privacy & Anonymity, Programming, Real-World Issues, Security Policies, Spyware, Storage, Tips, Wireless Security Tagged With: cyber-security, cyberspace, cyberworld, firewall, internet-security, intrusion

    How To Purchase the Right PC Protection Software

    13 February 2007 By Saran

    Among the conflicts that a person would encounter today is that of determining which among the vast array of software packages such as Mcafee, Norton and Symantec, to use. Each of this anti-virus software has their own line of specialty with regards to the high-risk infections and intrusions that can be harmful to any workstation of server.

    Antivirus Software

    With the rampant influx of different kinds of viruses and Trojans that have spread all over the world today, the proper anti-virus to safeguard computers has been an issue. For one, the lack of detection policies that each software has been customized does not readily cater to a general approach. If there is one setback for such is the fact of the lack of coverage with regards to the general protection that each person would be comfortable with today.

    If there is something that is lacking today, this is the fact that developers have limited themselves towards simply catering towards specific categories of intrusions rather than overall software that can address such security issues of most companies today.

    [tags]anti-virus software, firewall, computers, networks, wan, lan[/tags]

    Filed Under: IT Security Basics, Network Security, Operating Systems, Security Policies, Spyware, Wireless Security Tagged With: anti-virus-software, computers, firewall, lan, networks, wan

    The Value of Firewalls and Accessibility

    19 December 2006 By Saran

    For most people, the computer is just a form of word processing and tool for search queries to aid them in their daily needs, both at work and at home. As long as a person is able to use a personal desktop and surf and produce the needed reports, nothing else matters.

    Padlocking your Workstation
    With the rising count of malware and spyware today, it is best to note that firewalls and networking security have become one of the necessities that help safeguard computers and local intranets today. Unlike in the early years, hacking and intrusion have become rampant that has eventually raised the level of consciousness for most people who safeguard their files and documents.

    With the growing number of things to do over the web such as blogging, writing and graphics designing, the need to also protect their own workstations exposed through different ports is a priority today. It is not only a matter of being able to use a unit but also a matter of maintenance from unwanted public intrusions through the World Wide Web.

    [tags]firewall, security, internet[/tags]

    Filed Under: Malware, Network Security Tagged With: firewall, internet, Malware, Network Security, security

    Categories

    • Backups
    • Cryptography
    • E-mail
    • Firefox
    • General
    • Google Chrome
    • IM
    • Instant Messaging
    • IT Security Basics
    • Malware
    • Network Security
    • News
    • Operating Systems
    • Physical Security
    • Privacy & Anonymity
    • Programming
    • Real-World Issues
    • Review
    • Security Policies
    • Spyware
    • Storage
    • Tips
    • Web browsers
    • Wireless Security