Tip of the Week: Best Practices for Better Business Wi-Fi

Tip of the Week: Best Practices for Better Business Wi-Fi

Wi-Fi is one of those interesting technologies: On paper, it’s basically magic, but few things can send people into a rage faster than it not being available, or worse, not being good enough. Its capabilities have made it a great asset to the workplace, but you also need to be sure that you aren’t sacrificing your security to use it. We’ve put together some tips to help you achieve better, safer Wi-Fi.

1. Don’t Trust Your Wi-Fi’s Security

Wi-Fi isn’t particularly safe to use, at least without additional solutions to round out its security. Many device manufacturers may claim to have superior security measures baked in, but it is better to take these claims with a grain of salt and stack on additional protections. Take encryption, for instance. Using it will ensure that your data is safe while in transit, effectively guaranteeing that your security will be preserved (at least in this aspect).

It also wouldn’t hurt to actively adopt security best practices while you are browsing anyway, just to add an additional level of safety, like avoiding websites that use the HTTP protocol and not the secured HTTPS protocol.

2. Take Your Network into Consideration

While Wi-Fi may not be inherently safe, there are ways that you can improve its security somewhat. Here are just a few of them:

  • Even if you hide your network, change your SSID from the factory default to a unique but anonymous alternative on the router.
  • Minimize the number of access points to your wireless network by keeping Wi-Fi capable devices off when not in use, and if a wired ethernet connection can be used, use that instead of wireless.
  • Segregate your professional network from guest usage by creating a passphrase-protected guest account. Keep this passphrase updated regularly, and switch off the network when not needed.

Use the Proper Credentials

Speaking of passphrases, you should avoid using poorly-devised, insecure passwords. Weak passwords usually share some distinguishing features:

  • Common words, letters, and phrases being used, like “password123”
  • Characters don’t vary, so there isn’t a mix of letters, numbers, or symbols
  • The same password is used for multiple accounts
  • A password is written down or recorded somewhere insecure

Of course, there are other ways that a user will try to make their passwords as simple to remember as possible… After all, they want to be able to access their account without much trouble.

It isn’t acceptable for your employees to undermine your security like this, as understandable as their reasoning is. A good way to help both your security and the employees who need to access your resources is to encourage the use of passphrases over passwords. Mathematically more secure than a password and easier to remember, a passphrase takes three unrelated words (like “condemn”, “total”, and “plan”) and turns them into your proof of identity: so, in this case, “condemntotalplan.”  Much easier to remember than the traditional password, and simple enough to do without creating a common phrase. You can also use the traditional means of adding security, like swapping out numbers and symbols. A password manager can help you remember these by decreasing the number you have to remember to one.

BNMC is here if you want help with any of your security considerations. Give our experts a call at 978-482-2020. 



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 28 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Business Computing Productivity Privacy Cloud User Tips Email Microsoft Software Hackers Computer Network Security Hosted Solutions Malware Google Data Business Communication Efficiency Mobile Devices Tech Term Small Business IT Services Hardware IT Support Internet Workplace Tips Cloud Computing Managed IT Services Ransomware Innovation Smartphone Upgrade Smartphones Data Recovery Backup Outsourced IT Mobile Device Android Saving Money Information Windows Data Backup Miscellaneous Facebook Users Windows 10 Cybersecurity Office 365 Server Managed IT Services Phishing Business Management Microsoft Office Browser Social Media Business Continuity Windows 10 Data Management Passwords Internet of Things communications Network VoIP Vulnerability Productivity Remote Monitoring Gadgets Gmail App Word Disaster Recovery Encryption Apps Chrome Artificial Intelligence Infrastructure Quick Tips Managed Service Tip of the week Save Money Employer-Employee Relationship Applications Router Virtual Reality Analytics Settings Access Control Managed Service Provider VPN BYOD Money IT Support Website Office Tips Avoiding Downtime Robot Google Drive Antivirus Content Filtering Bandwidth Automation Big Data Networking Paperless Office Apple Education Storage Company Culture Government IT Management Data Security Unified Threat Management Computers Virtual Private Network YouTube Hacker Data storage Employee-Employer Relationship Development Maintenance Risk Management Collaboration Firewall Display Document Management Bring Your Own Device Operating System HIPAA Data Breach Social Network WiFi LiFi Vendor Management Two-factor Authentication Windows 7 Social Monitors BDR Information Technology Mobile Security Software as a Service Wireless Humor Chromebook Managed IT Service Laptop Solid State Drive Hosted Solution Scam The Internet of Things Administration Customer Relationship Management Mouse End of Support Business Intelligence Break Fix Hard Disk Drive Downtime Search Marketing SaaS Printing Data loss Wi-Fi Augmented Reality Server Management Password MSP Business Technology Holiday Touchscreen Telephone Systems Virtualization Managing Stress Managed IT desktop Tablet Retail Alert Remote Workers Outlook OneNote IT Spam Computing Buisness Mobility Batteries Spyware Private Cloud Smart Office Bluetooth Comparison Uninterrupted Power Supply Office Samsung Screen Reader Firefox Charging Superfish Computer Care IBM Budget Licensing Tech Support Dongle Virtual Desktop File Sharing Wires Address Permissions Sports Co-Managed IT Assessment User Error Managed Services Provider Typing Solar Patch Management Onboarding GDPR Holidays Print Toner Myths Identity Theft Best Practice Work Specifications Slack Hard Disk Drives Distribution Current Events Social Engineering Smart Tech Training Corporate Profile Cooperation Websites Service Level Agreement Heating/Cooling Multi-Factor Security Messaging Voice over Internet Protocol Content Huawei Hotspot Internet Exlporer Time Management Printer Entertainment Vendor Automobile Cryptocurrency Compliance Digital Signage Data Warehouse Payment Card G Suite Connectivity Shortcuts Mobile Management Google Docs IT Technicians Optimization Black Friday Cybercrime Monitoring Solid State Drives Logistics Dell IT solutions Going Green Safety WannaCry Staff Leominster Servers Google Calendar Employee-Employer Relationships Cabling Hacks Remote Computing Modem FinTech Emergency Streaming Processor Google Wallet Language Value Network Management iOS Hybrid Cloud Google Maps Bitcoin Network Congestion Regulations Dark Web Troubleshooting Business Analysis Inventory IoT Security Cameras Profiles Business Growth Mirgation Recycling Cyber Monday Spying National Security Asset Management Human Error Memory Legal K-12 Schools Legislation Analysis Students Writing Cookies Unified Communications Drones Computing Infrastructure Professional Services SharePoint Scalability Conferencing Windows 8 Social Networking Microsoft Excel Halloween Virus Shadow IT Star Wars Techology Managed Services Utility Computing Digital Payment Dark Data Update Chatbots eWaste Smart Technology Updates Memes Device Reducing Cost Digital Deep Learning Wearable Technology Network upgrade Statistics Mixed Reality Disaster Mobile Device Management Nanotechnology How To Lenovo Alerts Politics USB Downloads Migration Consulting Motherboard Cables Mail Merge Blockchain Scary Stories LED Threats Fraud Cost Management VoIP Unified Threat Management Laptops Alt Codes Customer Service Identity Continuity Shortcut Distributed Denial of Service Running Cable PowerPoint Health Webcam Mobile Computing Black Market Financial Law Enforcement Error Regulation Electronic Medical Records Point of Sale Ben McDonald shares Notifications Physical Security Travel Twitter Upgrades Gadget Emoji Crowdsourcing Supercomputer CrashOverride Staffing Personal Information Botnet Motion Sickness 3D Printing Administrator Cortana Taxes IT Budget Web Server what was your? GPS Machine Learning Processors IT Consultant Unsupported Software Printers Cameras Tracking Computer Repair Relocation Meetings Cleaning Mobile Data How To Work/Life Balance Recovery CCTV

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3