Archives - Wireless Network


What does Piggybacking do?

If you don’t secure your wireless network, anyone with a wireless-enabled computer in range of your access point could use your connection. The typical indoor broadcast range of an access point is 150 – 300 feet. Outdoors, this range may extend as far as 1,000 feet. So, if your neighborhood is closely settled, or if […]

Hide your Wi-Fi network’s name

While it’s vital to have a strong Wi-Fi password, hiding your Wi-Fi network’s name adds an extra layer of security. This can help conceal its existence entirely, providing access only to users who know it’s there. The option to do this in a router’s configuration page is listed as “Disable SSID broadcasting” or similar.  

Turn your Wi-Fi into a wired connection by using a powerline adapter

Wi-Fi connections are inherently unstable and vulnerable to bad actors. Wired connections avoid these issues. Powerline adapters, which are extremely simple to set up, turn a long-range Wi-Fi connection into a wired one by using your home’s electrical network. This makes it much more stable and less vulnerable but with the same if not better […]

Give remote workers secure Wi-Fi access

Provide cellular Wi-Fi hotspots or tethering plans so remote workers can use portable Wi-Fi hotspots. These can be used instead of allowing connections through public Wi-Fi networks to help regulate access and increase connection security. Wi-Fi hotspots should be password and login protected so they’re only accessible to employees.

Turn on your router’s Wireless Network Encryption

Encryption refers to the process of converting data into secret code so that outsiders can’t read the information if they were to access the communication. In other words, it keeps your information private. Most Wi-Fi routers have built-in encryption services that can be accessed in the settings. Log into your router’s settings and select the […]

Turn off automatic Wi-Fi connection on your smartphone device

Most smartphones have features that save on cellular data usage. For example, phones can automatically detect previously used Wi-Fi networks and connect to them when within range. Although you may save on data, you also risk compromising your device’s security. Public networks are less secure, therefore they are more susceptible to attacks. Prevent this issue […]