Choosing the Right Server Management Service
August 4, 2016
How to Handle Denial of Service Attacks
August 8, 2016
Choosing the Right Server Management Service
August 4, 2016
How to Handle Denial of Service Attacks
August 8, 2016
Annapolis server support, Alpha

WiFi permits electronic devices to connect to a wireless local area network (WLAN). Most modern computers, video-game consoles, smart phones, digital cameras, tablets and digital audio players are WiFi compatible. A WiFi access point or hotspot has an approximate indoor range of 20 meters (66 feet) and a greater outdoor range. Information travels over the network via radio waves, and so hacking is possible. Business WiFi networks need strong security measures that a certified IT support company can provide, along with taking the following steps.

Select the Correct Security Option

It’s critical for a small business to be certain its WiFi network is secure. The very first step is selecting the right security type. Below are the options with commentary.

WEP – Lacks protection against hackers because the key is easy to crack.

WPA – Stronger encryption algorithm mitigated problems associated with WEP.

WPA2 – More secure than WPA because of its AES-CCMP encryption key.
Deploying both WPA and WPA2 for security will probably confuse the hackers and make hacking a WiFi network more difficult when installed at access points.

Choose Unique SSID Name and Password

Don’t keep the default Service Set Identified (SSID) name and password provided by the manufacturer after you set up a Wi-Fi network because hackers will find them easy to crack. Make sure both are replaced by a unique/uncommon set of letters, numbers and characters. Doing so will make hacking your business WiFi very difficult.

Disable Remote Login

The remote login for a WiFi network makes it easier and more convenient to control at a distance from the router. Unfortunately, it also makes your business more vulnerable. It is advisable to disable your Wi-Fi’s remote login. Disabling it will prevent hackers from logging into your network and using its remote features.

Secure Ethernet Ports

You’ll be unable to protect your WiFi network if a hacker plugs into one of its Ethernet ports. Once connected to the Internet, the hacker can compromise all the computers using the network.  All Ethernet ports must be concealed to prevent being accessed by customers or strangers.

Alpha Engineering Business Support

Choosing an expert computer technology-support provider is an important decision for your business. Alpha Engineering Associates has been a trusted partner of many companies in the Washington, Baltimore and Annapolis areas since 1990 and offer:

  • 24/7 Managed Services for Business Computing Systems
  • Network and Mobile Computing Support
  • Disaster Recovery Planning
  • Software Development

For affordable client-focused network consulting services and solutions, please call Alpha Engineering Associates today at 410-295-9500.