By accepting you will be accessing a service provided by a third-party external to

Tip of the Week: Best Practices for Better Business Wi-Fi

Tip of the Week: Best Practices for Better Business Wi-Fi

Wi-Fi is one of those interesting technologies: On paper, it’s basically magic, but few things can send people into a rage faster than it not being available, or worse, not being good enough. Its capabilities have made it a great asset to the workplace, but you also need to be sure that you aren’t sacrificing your security to use it. We’ve put together some tips to help you achieve better, safer Wi-Fi.

1. Don’t Trust Your Wi-Fi’s Security

Wi-Fi isn’t particularly safe to use, at least without additional solutions to round out its security. Many device manufacturers may claim to have superior security measures baked in, but it is better to take these claims with a grain of salt and stack on additional protections. Take encryption, for instance. Using it will ensure that your data is safe while in transit, effectively guaranteeing that your security will be preserved (at least in this aspect).

It also wouldn’t hurt to actively adopt security best practices while you are browsing anyway, just to add an additional level of safety, like avoiding websites that use the HTTP protocol and not the secured HTTPS protocol.

2. Take Your Network into Consideration

While Wi-Fi may not be inherently safe, there are ways that you can improve its security somewhat. Here are just a few of them:

  • Even if you hide your network, change your SSID from the factory default to a unique but anonymous alternative on the router.
  • Minimize the number of access points to your wireless network by keeping Wi-Fi capable devices off when not in use, and if a wired ethernet connection can be used, use that instead of wireless.
  • Segregate your professional network from guest usage by creating a passphrase-protected guest account. Keep this passphrase updated regularly, and switch off the network when not needed.

Use the Proper Credentials

Speaking of passphrases, you should avoid using poorly-devised, insecure passwords. Weak passwords usually share some distinguishing features:

  • Common words, letters, and phrases being used, like “password123”
  • Characters don’t vary, so there isn’t a mix of letters, numbers, or symbols
  • The same password is used for multiple accounts
  • A password is written down or recorded somewhere insecure

Of course, there are other ways that a user will try to make their passwords as simple to remember as possible… After all, they want to be able to access their account without much trouble.

It isn’t acceptable for your employees to undermine your security like this, as understandable as their reasoning is. A good way to help both your security and the employees who need to access your resources is to encourage the use of passphrases over passwords. Mathematically more secure than a password and easier to remember, a passphrase takes three unrelated words (like “condemn”, “total”, and “plan”) and turns them into your proof of identity: so, in this case, “condemntotalplan.”  Much easier to remember than the traditional password, and simple enough to do without creating a common phrase. You can also use the traditional means of adding security, like swapping out numbers and symbols. A password manager can help you remember these by decreasing the number you have to remember to one.

BNMC is here if you want help with any of your security considerations. Give our experts a call at 978-482-2020. 



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, July 09 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing Privacy User Tips Cloud Network Security Email Hackers Hosted Solutions Microsoft Computer Business Software Efficiency Malware Communication Data Google IT Services Small Business Workplace Tips IT Support Mobile Devices Tech Term Hardware Cloud Computing Managed IT Services Internet Data Recovery Smartphone Android Innovation Backup Ransomware Mobile Device Users Outsourced IT Saving Money Upgrade Information Windows Smartphones Facebook Phishing Miscellaneous Data Backup Server Browser Business Management Windows 10 Social Media Microsoft Office Business Continuity Disaster Recovery communications VoIP Cybersecurity Office 365 Managed IT Services Productivity Network Data Management Windows 10 Passwords Internet of Things Gadgets App Word Vulnerability Gmail Remote Monitoring Managed Service Provider Mobile Office Quick Tips Infrastructure Managed Service Apps Encryption Artificial Intelligence Chrome Virtual Reality IT Support Money Applications Government Router Information Technology BYOD Website Tip of the week Company Culture Remote Workers Analytics Save Money Employer-Employee Relationship Networking Access Control VPN Settings HIPAA IT Management Data Security BDR Virtual Private Network Spam WiFi Unified Threat Management YouTube Computers Google Drive Risk Management Employee-Employer Relationship Bandwidth Maintenance Content Filtering Collaboration Firewall Display Office Tips Avoiding Downtime Antivirus Education Apple Storage Big Data Robot Development Automation Hacker Paperless Office Data storage Remote Computing Server Management Business Technology Touchscreen Outlook Computing Mobile Security Managed IT Data loss iOS SaaS Bring Your Own Device Operating System Tablet Social Wi-Fi How To LiFi Telephone Systems Virtualization Humor desktop Compliance Business Intelligence Holiday Hosted Solution Administration Conferencing Best Practice Retail Alert Managed Services Mouse Two-factor Authentication Regulations Managed IT Service Going Green Document Management IT Laptop OneNote MSP Social Network Customer Relationship Management Scam Augmented Reality Data Breach Monitors Solid State Drive Managing Stress Vendor Management Wireless The Internet of Things Break Fix Printing Windows 7 Chromebook Search Password Training Software as a Service Hard Disk Drive Downtime Remote Work Marketing End of Support Smart Office PCI DSS Digital Signage Data Warehouse Safety Cyber Monday Mobile Device Management WannaCry Screen Reader Charging Logistics Entertainment Vendor Deep Learning Cabling Monitoring Solid State Drives Legislation Wires Shortcuts Mobile Management Google Maps Licensing Dongle Employee-Employer Relationships Network Congestion SharePoint Alt Codes Solar Streaming Processor Microsoft Excel Assessment Inventory Work Halloween Troubleshooting Business Analysis Smart Technology Smart Tech Asset Management Hybrid Cloud Techology Peripheral Spying National Security Writing Statistics Voice over Internet Protocol Security Cameras Profiles Lenovo Budget Cooperation Service Level Agreement Analysis Students Downloads Typing Human Error Memory Mail Merge Blockchain Digital Payment Hotspot Internet Exlporer Shadow IT Disaster IT Technicians Optimization Scary Stories Virus Shortcut Distributed Denial of Service Current Events Digital Connectivity Memes Scalability Dark Data Update VoIP Unified Threat Management Management Running Cable Updates Bluetooth Comparison Modem FinTech Utility Computing Firefox Superfish Staff Leominster Mixed Reality Cryptocurrency Buisness Device Reducing Cost Politics Address Permissions Language Value Gamification Google Docs Uninterrupted Power Supply Mirgation Recycling Sports LED Threats Work/Life Balance Patch Management IT solutions Spyware IoT Virtual Desktop Migration Consulting Customer Service User Error Policy PowerPoint Office Samsung Specifications Hacks Computer Care IBM Cookies Laptops Health Private Cloud File Sharing K-12 Schools Heating/Cooling Multi-Factor Security Bitcoin Social Networking Mobility Batteries Tech Support Google Wallet Computing Infrastructure Professional Services COVID-19 Printer Business Growth Chatbots eWaste Co-Managed IT Identity Theft Star Wars Holidays Time Management Network upgrade Procedure Onboarding GDPR Social Engineering Black Friday Corporate Profile Nanotechnology Distribution Managed Services Provider Legal Wearable Technology Cybercrime Slack Hard Disk Drives Twitter Servers Google Calendar Windows 8 G Suite Motherboard Cables Print Toner Myths Websites Emergency Unified Communications Automobile Drones Alerts USB Network Management Dell Identity Continuity Content Huawei Dark Web Fraud Cost Management Payment Card Messaging Crowdsourcing Staffing Motion Sickness Taxes Personal Information Botnet Administrator Cortana Web Server what was your? 3D Printing IT Budget Mobile Computing GPS Regulation Processors IT Consultant Machine Learning Cameras Unsupported Software Meetings Printers Tracking Cleaning Computer Repair Relocation CCTV Mobile Data Webcam How To Recovery Black Market Error Point of Sale Ben McDonald shares Financial Law Enforcement Notifications Electronic Medical Records Travel Physical Security Emoji Upgrades Gadget Supercomputer CrashOverride

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3