Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.
But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. As WLANs send information over radio waves, someone with a receiver in your area could be picking up the transmission, thus gaining access to your computer.
They could load viruses on to your laptop which could be transferred to the company's network when you go back to work.
Up to 75 per cent of WLAN users do not have standard security features installed, while 20 per cent are left completely open as default configurations are not secured, but made for the users to have their network up and running ASAP.
It is recommended that wireless router/access point setup be always done though a wired client.
Change default administrative password on wireless router/access point to a secured password.
Enable at least 128-bit WEP encryption on both card and access point. Change your WEP keys periodically. If equipment does not support at least 128-bit WEP encryption, consider replacing it.
Although there are security issues with WEP, it represents minimum level of security, and it should be enabled.
Change the default SSID on your router/access point to a hard to guess name. Setup your computer device to connect to this SSID by default.
Setup router/access point not to broadcast the SSID. The same SSID needs to be setup on the client side manually. This feature may not be available on all equipment.
Block anonymous Internet requests or pings.
On each computer having wireless network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.
Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses should be registered with the router /access point.
Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.
You can test your hardware and personal firewalls using Shields Up test available at http://www.grc.com
All computers should have a properly configured personal firewall in addition to a hardware firewall.
Update router/access point firmware when new versions become available.
Locate router/access point away from strangers so they cannot reset the router/access point to default settings.
Locate router/access point in the middle of the building rather than near windows to limit signal coverage outside the building.
While none of the measure suggested above provides full protection as counter measures exist, a collection of suggested measures will act as a deterrent against attacker when other insecure networks represent easier targets.
The author of this article ia a software developer, consultant and author of numerous books. Visit his site for more information about the Top Spyware Removal Software.
First of all we need to get some terms stated.... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Threats we ordinary Web users face online leave us no... Read More
If you are wondering how to fight spyware for safe... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
P C. owners are constantly at risk from attacks by... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
In recent days, I was one of the unfortunate persons... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Did you know...? 1 in 5 children who use computer... Read More
Paypal is a great site and is used by many... Read More
My first experience with a spyware BHO based infection was... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Over the past few years as the internet has become... Read More
There are ways to insure security though. You can get... Read More
Ok, you've got a computer, and you get online. You... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Spyware is the most troublesome software to appear on the... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Having a good Spyware eliminator on your computer is vital... Read More
There are folks out there who use their powers for... Read More
If you have used a Windows machine for a while,... Read More
Do you really have to know how feeds work? Not... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
First off I should explain what phishing is. Phishing is... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Huge number of spyware software applications are available in the... Read More
When surfing the Internet you probably take your anonymity for... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
This is not some new fangled techno-speak, it is a... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
During the release of a new software product specialized to... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Much has been said on the theory of password protection... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Since its birth, the Internet has grown and expanded to... Read More
A week or so ago, I received an inquiry from... Read More
If spyware were a person and he set himself up... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
No longer are viruses the only threat on the internet.... Read More
By browsing a web page, you could infect your computer... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Watching how the traditional media covers the latest virus or... Read More
First I would like to stress I am condoning the... Read More
Despite the current wave of identity theft and corporate security... Read More
Every now and then you can read about a new... Read More
Be careful of sites that promise to send you "instant... Read More
Sooner or later everyone with an email account will receive... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Today,on most internet user's computers, we have the ability to... Read More
As you know, this time the virus under the name... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Do you really have to know how feeds work? Not... Read More
You'd better learn news from media, not from emails, security... Read More
When surfing the Internet you probably take your anonymity for... Read More
Internet Security |